diff --git a/108f2867fde2069b7ac6.wasm b/108f2867fde2069b7ac6.wasm deleted file mode 100644 index 96405142b..000000000 Binary files a/108f2867fde2069b7ac6.wasm and /dev/null differ diff --git a/206.bundle.js b/206.bundle.js new file mode 100644 index 000000000..77299a116 --- /dev/null +++ b/206.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={206:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=206.bundle.js.map \ No newline at end of file diff --git a/206.bundle.js.map b/206.bundle.js.map new file mode 100644 index 000000000..50f81be47 --- /dev/null +++ b/206.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"206.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t206: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/258.bundle.js b/258.bundle.js new file mode 100644 index 000000000..96bc27ad0 --- /dev/null +++ b/258.bundle.js @@ -0,0 +1,2 @@ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[258,877],{81:(_,t,e)=>{_.exports=e.p+"58342153fc9a001d7976.wasm"},977:(_,t,e)=>{_.exports=e.p+"2d6a4d794221941c07b8.js"},877:(_,t,e)=>{e.a(_,(async(_,r)=>{try{function i(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}let o;e.d(t,{$7:()=>B_,Ao:()=>q_,BP:()=>M_,D0:()=>A_,Fs:()=>L_,KC:()=>U_,LW:()=>E_,OS:()=>O_,Yc:()=>J_,ZD:()=>C_,ZF:()=>I_,ZX:()=>$_,Zc:()=>R_,c7:()=>j_,hv:()=>D_,pF:()=>N_,pV:()=>T_,qp:()=>z_,to:()=>W_});const a=new Array(128).fill(void 0);function s(_){return a[_]}a.push(void 0,null,!0,!1);let c=a.length;function g(_){_<132||(a[_]=c,c=_)}function w(_){const t=s(_);return g(_),t}const d="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&d.decode();let b=null;function l(){return null!==b&&b.buffer===o.memory.buffer||(b=new Uint8Array(o.memory.buffer)),b}function u(_,t){return _>>>=0,d.decode(l().slice(_,_+t))}function f(_){c===a.length&&a.push(a.length+1);const t=c;return c=a[t],a[t]=_,t}let p=0;const y="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},m=function(_,t){const e=y.encode(_);return t.set(e),{read:_.length,written:e.length}};function h(_,t,e){if(void 0===e){const e=y.encode(_),r=t(e.length,1)>>>0;return l().subarray(r,r+e.length).set(e),p=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=l();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=l().subarray(n+o,n+r);o+=m(_,t).written,n=e(n,r,o,1)>>>0}return p=o,n}function v(_){return null==_}let k=null;function P(){return null!==k&&k.buffer===o.memory.buffer||(k=new Int32Array(o.memory.buffer)),k}function S(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=S(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const x="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>{o.__wbindgen_export_3.get(_.dtor)(_.a,_.b)}));function V(_,t,e,r){const n={a:_,b:t,cnt:1,dtor:e},i=(..._)=>{n.cnt++;const t=n.a;n.a=0;try{return r(t,n.b,..._)}finally{0==--n.cnt?(o.__wbindgen_export_3.get(n.dtor)(t,n.b),x.unregister(n)):n.a=t}};return i.original=n,x.register(i,n,n),i}function F(_,t,e){o._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(_,t,f(e))}function T(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function R(_,t){const e=t(1*_.length,1)>>>0;return l().set(_,e/1),p=_.length,e}function z(_,t,e,r){try{const a=o.__wbindgen_add_to_stack_pointer(-16);T(_,q),T(t,p_),T(e,r_);const s=h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.verifyFunctionExecution(a,_.__wbg_ptr,t.__wbg_ptr,e.__wbg_ptr,s,c);var n=P()[a/4+0],i=P()[a/4+1];if(P()[a/4+2])throw w(i);return 0!==n}finally{o.__wbindgen_add_to_stack_pointer(16)}}let A=null;function O(){return null!==A&&A.buffer===o.memory.buffer||(A=new BigInt64Array(o.memory.buffer)),A}function j(_,t){return _>>>=0,l().subarray(_/1,_/1+t)}function K(_){o.runRayonThread(_)}function C(_,t){return w(o.initThreadPool(f(_),t))}function E(_,t){try{return _.apply(this,t)}catch(_){o.__wbindgen_exn_store(f(_))}}function M(_,t,e,r){o.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(_,t,f(e),f(r))}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_address_free(_>>>0)));let U=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,B.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_address_free(_)}static from_private_key(t){T(t,G);const e=o.address_from_private_key(t.__wbg_ptr);return _.__wrap(e)}static from_view_key(t){T(t,m_);const e=o.address_from_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.address_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.address_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}verify(_,t){const e=R(_,o.__wbindgen_malloc),r=p;T(t,b_);return 0!==o.address_verify(this.__wbg_ptr,e,r,t.__wbg_ptr)}};const I="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_execution_free(_>>>0)));let q=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,I.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,I.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_execution_free(_)}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.execution_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.execution_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const W="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_executionresponse_free(_>>>0)));let $=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,W.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,W.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_executionresponse_free(_)}getOutputs(){return w(o.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const _=o.executionresponse_getExecution(this.__wbg_ptr);return 0===_?void 0:q.__wrap(_)}getKeys(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.executionresponse_getKeys(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return L.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const _=o.executionresponse_getProvingKey(this.__wbg_ptr);return 0===_?void 0:a_.__wrap(_)}getVerifyingKey(){const _=o.executionresponse_getVerifyingKey(this.__wbg_ptr);return p_.__wrap(_)}getFunctionId(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.executionresponse_getFunctionId(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}getProgram(){const _=o.executionresponse_getProgram(this.__wbg_ptr);return r_.__wrap(_)}};const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_field_free(_>>>0)));let N=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,D.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_field_free(_)}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.field_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.field_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const J="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_keypair_free(_>>>0)));class L{static __wrap(_){_>>>=0;const t=Object.create(L.prototype);return t.__wbg_ptr=_,J.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,J.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_keypair_free(_)}constructor(_,t){T(_,a_);var e=_.__destroy_into_raw();T(t,p_);var r=t.__destroy_into_raw();const n=o.keypair_new(e,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.keypair_provingKey(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return a_.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.keypair_verifyingKey(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return p_.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_metadata_free(_>>>0)));let Z=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,H.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_metadata_free(_)}get name(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_name(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set name(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_name(this.__wbg_ptr,t,e)}get locator(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_locator(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set locator(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_locator(this.__wbg_ptr,t,e)}get prover(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_prover(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set prover(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_prover(this.__wbg_ptr,t,e)}get verifier(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set verifier(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_verifier(this.__wbg_ptr,t,e)}get verifyingKey(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set verifyingKey(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,e)}static baseUrl(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.metadata_baseUrl(n);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static bond_public(){const t=o.metadata_bond_public();return _.__wrap(t)}static bond_validator(){const t=o.metadata_bond_validator();return _.__wrap(t)}static claim_unbond_public(){const t=o.metadata_claim_unbond_public();return _.__wrap(t)}static fee_private(){const t=o.metadata_fee_private();return _.__wrap(t)}static fee_public(){const t=o.metadata_fee_public();return _.__wrap(t)}static inclusion(){const t=o.metadata_inclusion();return _.__wrap(t)}static join(){const t=o.metadata_join();return _.__wrap(t)}static set_validator_state(){const t=o.metadata_set_validator_state();return _.__wrap(t)}static split(){const t=o.metadata_split();return _.__wrap(t)}static transfer_private(){const t=o.metadata_transfer_private();return _.__wrap(t)}static transfer_private_to_public(){const t=o.metadata_transfer_private_to_public();return _.__wrap(t)}static transfer_public(){const t=o.metadata_transfer_public();return _.__wrap(t)}static transfer_public_as_signer(){const t=o.metadata_transfer_public_as_signer();return _.__wrap(t)}static transfer_public_to_private(){const t=o.metadata_transfer_public_to_private();return _.__wrap(t)}static unbond_public(){const t=o.metadata_unbond_public();return _.__wrap(t)}};const Q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_offlinequery_free(_>>>0)));let X=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Q.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Q.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_offlinequery_free(_)}constructor(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.offlinequery_new(r,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return this.__wbg_ptr=t>>>0,this}finally{o.__wbindgen_add_to_stack_pointer(16)}}addStatePath(_,t){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p,a=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,a,s);var e=P()[r/4+0];if(P()[r/4+1])throw w(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.offlinequery_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.offlinequery_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_privatekey_free(_>>>0)));let G=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Y.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_privatekey_free(_)}constructor(){const _=o.privatekey_new();return this.__wbg_ptr=_>>>0,this}static from_seed_unchecked(t){const e=R(t,o.__wbindgen_malloc),r=p,n=o.privatekey_from_seed_unchecked(e,r);return _.__wrap(n)}static from_string(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.privatekey_from_string(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.privatekey_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}to_view_key(){const _=o.privatekey_to_view_key(this.__wbg_ptr);return m_.__wrap(_)}to_address(){const _=o.privatekey_to_address(this.__wbg_ptr);return U.__wrap(_)}sign(_){const t=R(_,o.__wbindgen_malloc),e=p,r=o.privatekey_sign(this.__wbg_ptr,t,e);return b_.__wrap(r)}static newEncrypted(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekey_newEncrypted(r,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return t_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return t_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const i=o.__wbindgen_add_to_stack_pointer(-16);T(t,t_);const a=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.privatekey_fromPrivateKeyCiphertext(i,t.__wbg_ptr,a,s);var r=P()[i/4+0],n=P()[i/4+1];if(P()[i/4+2])throw w(n);return _.__wrap(r)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_privatekeyciphertext_free(_>>>0)));let t_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,__.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_privatekeyciphertext_free(_)}static encryptPrivateKey(t,e){try{const i=o.__wbindgen_add_to_stack_pointer(-16);T(t,G);const a=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.privatekey_toCiphertext(i,t.__wbg_ptr,a,s);var r=P()[i/4+0],n=P()[i/4+1];if(P()[i/4+2])throw w(n);return _.__wrap(r)}finally{o.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return G.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.privatekeyciphertext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.privatekeyciphertext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_program_free(_>>>0)));let r_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,e_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_program_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.program_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.program_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}hasFunction(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;return 0!==o.program_hasFunction(this.__wbg_ptr,t,e)}getFunctions(){return w(o.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.program_getMappings(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return w(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getRecordMembers(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getStructMembers(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=o.program_getCreditsProgram();return _.__wrap(t)}id(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.program_id(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}address(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.program_address(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return U.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){T(t,_);return 0!==o.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return w(o.program_getImports(this.__wbg_ptr))}};const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_programmanager_free(_>>>0)));let i_=class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_programmanager_free(_)}static buildDeploymentTransaction(_,t,e,r,n,i,a,s,c){T(_,G);const g=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),d=p;let b=0;v(r)||(T(r,w_),b=r.__destroy_into_raw());var l=v(n)?0:h(n,o.__wbindgen_malloc,o.__wbindgen_realloc),u=p;let y=0;v(a)||(T(a,a_),y=a.__destroy_into_raw());let m=0;v(s)||(T(s,p_),m=s.__destroy_into_raw());let k=0;v(c)||(T(c,X),k=c.__destroy_into_raw());return w(o.programmanager_buildDeploymentTransaction(_.__wbg_ptr,g,d,e,b,l,u,v(i)?0:f(i),y,m,k))}static estimateDeploymentFee(_,t){const e=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;return w(o.programmanager_estimateDeploymentFee(e,r,v(t)?0:f(t)))}static estimateProgramNameCost(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.programmanager_estimateProgramNameCost(r,n,i);var t=O()[r/8+0],e=P()[r/4+2];if(P()[r/4+3])throw w(e);return BigInt.asUintN(64,t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(_,t,e,r,n,i,a,s,c,g,d){T(_,G);const b=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),l=p,u=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(s)||(T(s,a_),m=s.__destroy_into_raw());let k=0;v(c)||(T(c,p_),k=c.__destroy_into_raw());var P=v(g)?0:h(g,o.__wbindgen_malloc,o.__wbindgen_realloc),S=p;let x=0;v(d)||(T(d,X),x=d.__destroy_into_raw());return w(o.programmanager_executeFunctionOffline(_.__wbg_ptr,b,l,u,y,f(r),n,i,v(a)?0:f(a),m,k,P,S,x))}static buildExecutionTransaction(_,t,e,r,n,i,a,s,c,g,d,b,l){T(_,G);const u=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p,m=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),k=p;let P=0;v(i)||(T(i,w_),P=i.__destroy_into_raw());var S=v(a)?0:h(a,o.__wbindgen_malloc,o.__wbindgen_realloc),x=p;let V=0;v(c)||(T(c,a_),V=c.__destroy_into_raw());let F=0;v(g)||(T(g,p_),F=g.__destroy_into_raw());let R=0;v(d)||(T(d,a_),R=d.__destroy_into_raw());let z=0;v(b)||(T(b,p_),z=b.__destroy_into_raw());let A=0;v(l)||(T(l,X),A=l.__destroy_into_raw());return w(o.programmanager_buildExecutionTransaction(_.__wbg_ptr,u,y,m,k,f(r),n,P,S,x,v(s)?0:f(s),V,F,R,z,A))}static estimateExecutionFee(_,t,e,r,n,i,a,s,c){T(_,G);const g=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),d=p,b=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),l=p;var u=v(n)?0:h(n,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(a)||(T(a,a_),m=a.__destroy_into_raw());let k=0;v(s)||(T(s,p_),k=s.__destroy_into_raw());let P=0;v(c)||(T(c,X),P=c.__destroy_into_raw());return w(o.programmanager_estimateExecutionFee(_.__wbg_ptr,g,d,b,l,f(r),u,y,v(i)?0:f(i),m,k,P))}static estimateFinalizeFee(_,t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.programmanager_estimateFinalizeFee(n,i,a,s,c);var e=O()[n/8+0],r=P()[n/4+2];if(P()[n/4+3])throw w(r);return BigInt.asUintN(64,e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(_,t,e,r,n,i,a,s,c,g,d){T(_,G),T(t,w_);var b=t.__destroy_into_raw();T(e,w_);var l=e.__destroy_into_raw();let u=0;v(n)||(T(n,w_),u=n.__destroy_into_raw());var f=v(i)?0:h(i,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(a)||(T(a,a_),m=a.__destroy_into_raw());let k=0;v(s)||(T(s,p_),k=s.__destroy_into_raw());let P=0;v(c)||(T(c,a_),P=c.__destroy_into_raw());let S=0;v(g)||(T(g,p_),S=g.__destroy_into_raw());let x=0;v(d)||(T(d,X),x=d.__destroy_into_raw());return w(o.programmanager_buildJoinTransaction(_.__wbg_ptr,b,l,r,u,f,y,m,k,P,S,x))}static buildSplitTransaction(_,t,e,r,n,i,a){T(_,G),T(e,w_);var s=e.__destroy_into_raw(),c=v(r)?0:h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),g=p;let d=0;v(n)||(T(n,a_),d=n.__destroy_into_raw());let b=0;v(i)||(T(i,p_),b=i.__destroy_into_raw());let l=0;v(a)||(T(a,X),l=a.__destroy_into_raw());return w(o.programmanager_buildSplitTransaction(_.__wbg_ptr,t,s,c,g,d,b,l))}static buildTransferTransaction(_,t,e,r,n,i,a,s,c,g,d,b,l){T(_,G);const u=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),f=p,y=h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),m=p;let k=0;v(n)||(T(n,w_),k=n.__destroy_into_raw());let P=0;v(a)||(T(a,w_),P=a.__destroy_into_raw());var S=v(s)?0:h(s,o.__wbindgen_malloc,o.__wbindgen_realloc),x=p;let V=0;v(c)||(T(c,a_),V=c.__destroy_into_raw());let F=0;v(g)||(T(g,p_),F=g.__destroy_into_raw());let R=0;v(d)||(T(d,a_),R=d.__destroy_into_raw());let z=0;v(b)||(T(b,p_),z=b.__destroy_into_raw());let A=0;v(l)||(T(l,X),A=l.__destroy_into_raw());return w(o.programmanager_buildTransferTransaction(_.__wbg_ptr,t,u,f,y,m,k,i,P,S,x,V,F,R,z,A))}static synthesizeKeyPair(_,t,e,r,n){T(_,G);const i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;return w(o.programmanager_synthesizeKeyPair(_.__wbg_ptr,i,a,s,c,f(r),v(n)?0:f(n)))}};const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_provingkey_free(_>>>0)));let a_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,o_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_provingkey_free(_)}isBondPublicProver(){return 0!==o.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==o.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==o.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==o.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==o.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==o.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==o.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==o.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==o.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==o.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==o.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==o.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==o.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==o.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==o.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_checksum(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}copy(){const t=o.provingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=R(t,o.__wbindgen_malloc),a=p;o.provingkey_fromBytes(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.provingkey_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_toBytes(n,this.__wbg_ptr);var _=P()[n/4+0],t=P()[n/4+1],e=P()[n/4+2];if(P()[n/4+3])throw w(e);var r=j(_,t).slice();return o.__wbindgen_free(_,1*t,1),r}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const s_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_recordciphertext_free(_>>>0)));let c_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,s_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,s_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_recordciphertext_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.recordciphertext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordciphertext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}decrypt(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16);T(_,m_),o.recordciphertext_decrypt(r,this.__wbg_ptr,_.__wbg_ptr);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}isOwner(_){T(_,m_);return 0!==o.recordciphertext_isOwner(this.__wbg_ptr,_.__wbg_ptr)}};const g_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_recordplaintext_free(_>>>0)));let w_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,g_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,g_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_recordplaintext_free(_)}commitment(_,t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.recordplaintext_commitment(n,this.__wbg_ptr,i,a,s,c);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return N.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.recordplaintext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordplaintext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}microcredits(){const _=o.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,_)}nonce(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordplaintext_nonce(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}serialNumberString(_,t,e){let r,n;try{const b=o.__wbindgen_add_to_stack_pointer(-16);T(_,G);const l=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),f=p,y=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),m=p;o.recordplaintext_serialNumberString(b,this.__wbg_ptr,_.__wbg_ptr,l,f,y,m);var i=P()[b/4+0],a=P()[b/4+1],s=P()[b/4+2],c=P()[b/4+3],g=i,d=a;if(c)throw g=0,d=0,w(s);return r=g,n=d,u(g,d)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(r,n,1)}}};const d_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_signature_free(_>>>0)));let b_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,d_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,d_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_signature_free(_)}static sign(t,e){T(t,G);const r=R(e,o.__wbindgen_malloc),n=p,i=o.privatekey_sign(t.__wbg_ptr,r,n);return _.__wrap(i)}verify(_,t){T(_,U);const e=R(t,o.__wbindgen_malloc),r=p;return 0!==o.signature_verify(this.__wbg_ptr,_.__wbg_ptr,e,r)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.signature_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.signature_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const l_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_transaction_free(_>>>0)));let u_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,l_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,l_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_transaction_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.transaction_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}transactionId(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_transactionId(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}transactionType(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_transactionType(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const f_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_verifyingkey_free(_>>>0)));let p_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,f_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,f_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_verifyingkey_free(_)}static bondPublicVerifier(){const t=o.verifyingkey_bondPublicVerifier();return _.__wrap(t)}static bondValidatorVerifier(){const t=o.verifyingkey_bondValidatorVerifier();return _.__wrap(t)}static claimUnbondPublicVerifier(){const t=o.verifyingkey_claimUnbondPublicVerifier();return _.__wrap(t)}static feePrivateVerifier(){const t=o.verifyingkey_feePrivateVerifier();return _.__wrap(t)}static feePublicVerifier(){const t=o.verifyingkey_feePublicVerifier();return _.__wrap(t)}static inclusionVerifier(){const t=o.verifyingkey_inclusionVerifier();return _.__wrap(t)}static joinVerifier(){const t=o.verifyingkey_joinVerifier();return _.__wrap(t)}static setValidatorStateVerifier(){const t=o.verifyingkey_setValidatorStateVerifier();return _.__wrap(t)}static splitVerifier(){const t=o.verifyingkey_splitVerifier();return _.__wrap(t)}static transferPrivateVerifier(){const t=o.verifyingkey_transferPrivateVerifier();return _.__wrap(t)}static transferPrivateToPublicVerifier(){const t=o.verifyingkey_transferPrivateToPublicVerifier();return _.__wrap(t)}static transferPublicVerifier(){const t=o.verifyingkey_transferPublicVerifier();return _.__wrap(t)}static transferPublicAsSignerVerifier(){const t=o.verifyingkey_transferPublicAsSignerVerifier();return _.__wrap(t)}static transferPublicToPrivateVerifier(){const t=o.verifyingkey_transferPublicToPrivateVerifier();return _.__wrap(t)}static unbondPublicVerifier(){const t=o.verifyingkey_unbondPublicVerifier();return _.__wrap(t)}isBondPublicVerifier(){return 0!==o.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==o.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==o.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==o.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==o.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==o.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==o.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==o.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==o.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==o.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==o.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==o.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==o.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==o.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==o.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_checksum(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}copy(){const t=o.verifyingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=R(t,o.__wbindgen_malloc),a=p;o.verifyingkey_fromBytes(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.verifyingkey_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_toBytes(n,this.__wbg_ptr);var _=P()[n/4+0],t=P()[n/4+1],e=P()[n/4+2];if(P()[n/4+3])throw w(e);var r=j(_,t).slice();return o.__wbindgen_free(_,1*t,1),r}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const y_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_viewkey_free(_>>>0)));let m_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,y_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,y_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_viewkey_free(_)}static from_private_key(t){T(t,G);const e=o.privatekey_to_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.viewkey_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.viewkey_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}to_address(){const _=o.address_from_view_key(this.__wbg_ptr);return U.__wrap(_)}decrypt(_){let t,e;try{const g=o.__wbindgen_add_to_stack_pointer(-16),d=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),b=p;o.viewkey_decrypt(g,this.__wbg_ptr,d,b);var r=P()[g/4+0],n=P()[g/4+1],i=P()[g/4+2],a=P()[g/4+3],s=r,c=n;if(a)throw s=0,c=0,w(i);return t=s,e=c,u(s,c)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(t,e,1)}}};async function h_(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}function v_(){const _={wbg:{}};return _.wbg.__wbindgen_object_drop_ref=function(_){w(_)},_.wbg.__wbg_new_71801a555ad9f2aa=function(){return E((function(){return f(new XMLHttpRequest)}),arguments)},_.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return E((function(_,t,e){s(_).overrideMimeType(u(t,e))}),arguments)},_.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return E((function(_,t,e,r,n,i){s(_).open(u(t,e),u(r,n),0!==i)}),arguments)},_.wbg.__wbg_send_80d29985093c1ec5=function(){return E((function(_){s(_).send()}),arguments)},_.wbg.__wbg_response_7c2e2759084f7279=function(){return E((function(_){return f(s(_).response)}),arguments)},_.wbg.__wbg_status_d485fb5a478426fb=function(){return E((function(_){return s(_).status}),arguments)},_.wbg.__wbg_new_72fb9a18b5ae2624=function(){return f(new Object)},_.wbg.__wbindgen_string_new=function(_,t){return f(u(_,t))},_.wbg.__wbg_set_1f9b04f170055d33=function(){return E((function(_,t,e){return Reflect.set(s(_),s(t),s(e))}),arguments)},_.wbg.__wbg_new_ab6fd82b10560829=function(){return E((function(){return f(new Headers)}),arguments)},_.wbg.__wbindgen_object_clone_ref=function(_){return f(s(_))},_.wbg.__wbg_new_0d76b0581eca6298=function(){return E((function(){return f(new AbortController)}),arguments)},_.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return f(s(_).signal)},_.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return E((function(_,t,e,r,n){s(_).append(u(t,e),u(r,n))}),arguments)},_.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=s(_)instanceof Response}catch(_){t=!1}return t},_.wbg.__wbg_status_61a01141acd3cf74=function(_){return s(_).status},_.wbg.__wbg_url_5f6dc4009ac5f99d=function(_,t){const e=h(s(t).url,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbg_headers_9620bfada380764a=function(_){return f(s(_).headers)},_.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return f(Symbol.iterator)},_.wbg.__wbg_get_e3c254076557e348=function(){return E((function(_,t){return f(Reflect.get(s(_),s(t)))}),arguments)},_.wbg.__wbindgen_is_function=function(_){return"function"==typeof s(_)},_.wbg.__wbg_call_27c0f87801dedf93=function(){return E((function(_,t){return f(s(_).call(s(t)))}),arguments)},_.wbg.__wbindgen_is_object=function(_){const t=s(_);return"object"==typeof t&&null!==t},_.wbg.__wbg_next_40fc327bfc8770e6=function(_){return f(s(_).next)},_.wbg.__wbg_next_196c84450b364254=function(){return E((function(_){return f(s(_).next())}),arguments)},_.wbg.__wbg_done_298b57d23c0fc80c=function(_){return s(_).done},_.wbg.__wbg_value_d93c65011f51a456=function(_){return f(s(_).value)},_.wbg.__wbg_abort_2aa7521d5690750e=function(_){s(_).abort()},_.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return E((function(_){return f(JSON.stringify(s(_)))}),arguments)},_.wbg.__wbindgen_string_get=function(_,t){const e=s(t),r="string"==typeof e?e:void 0;var n=v(r)?0:h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;P()[_/4+1]=i,P()[_/4+0]=n},_.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(u(_,t))},_.wbg.__wbindgen_bigint_from_u64=function(_){return f(BigInt.asUintN(64,_))},_.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return E((function(_,t,e){return f(s(_).call(s(t),s(e)))}),arguments)},_.wbg.__wbg_transaction_new=function(_){return f(u_.__wrap(_))},_.wbg.__wbg_keypair_new=function(_){return f(L.__wrap(_))},_.wbg.__wbindgen_module=function(){return f(x_.__wbindgen_wasm_module)},_.wbg.__wbindgen_memory=function(){return f(o.memory)},_.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,e,r){return f(i(s(_),s(t),s(e),r>>>0))},_.wbg.__wbg_executionresponse_new=function(_){return f($.__wrap(_))},_.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return f(new Array(_>>>0))},_.wbg.__wbg_set_d4638f722068f043=function(_,t,e){s(_)[t>>>0]=w(e)},_.wbg.__wbindgen_cb_drop=function(_){const t=w(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},_.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return f(new Array)},_.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return s(_).push(s(t))},_.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return E((function(_){return f(s(_).arrayBuffer())}),arguments)},_.wbg.__wbg_new_63b92bc8671ed464=function(_){return f(new Uint8Array(s(_)))},_.wbg.__wbg_length_c20a40f15020d68a=function(_){return s(_).length},_.wbg.__wbg_new_81740750da40724f=function(_,t){try{var e={a:_,b:t};const r=new Promise(((_,t)=>{const r=e.a;e.a=0;try{return M(r,e.b,_,t)}finally{e.a=r}}));return f(r)}finally{e.a=e.b=0}},_.wbg.__wbindgen_number_new=function(_){return f(_)},_.wbg.__wbg_new_abda76e883ba8a5f=function(){return f(new Error)},_.wbg.__wbg_stack_658279fe44541cf6=function(_,t){const e=h(s(t).stack,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbg_error_f851667af71bcfc6=function(_,t){let e,r;try{e=_,r=t,console.error(u(_,t))}finally{o.__wbindgen_free(e,r,1)}},_.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return f(s(_).buffer)},_.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,e){return f(new Uint8Array(s(_),t>>>0,e>>>0))},_.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return E((function(_,t){s(_).randomFillSync(w(t))}),arguments)},_.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,e){return f(s(_).subarray(t>>>0,e>>>0))},_.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return E((function(_,t){s(_).getRandomValues(s(t))}),arguments)},_.wbg.__wbg_set_a47bac70306a19a7=function(_,t,e){s(_).set(s(t),e>>>0)},_.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return f(s(_).crypto)},_.wbg.__wbg_process_4a72847cc503995b=function(_){return f(s(_).process)},_.wbg.__wbg_versions_f686565e586dd935=function(_){return f(s(_).versions)},_.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return f(s(_).node)},_.wbg.__wbindgen_is_string=function(_){return"string"==typeof s(_)},_.wbg.__wbg_require_cca90b1a94a0255b=function(){return E((function(){return f(module.require)}),arguments)},_.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return f(s(_).msCrypto)},_.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return f(new Uint8Array(_>>>0))},_.wbg.__wbg_length_cd7af8117672b8b8=function(_){return s(_).length},_.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return f(s(_)[t>>>0])},_.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return E((function(){return f(self.self)}),arguments)},_.wbg.__wbg_window_c6fb939a7f436783=function(){return E((function(){return f(window.window)}),arguments)},_.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return E((function(){return f(globalThis.globalThis)}),arguments)},_.wbg.__wbg_global_207b558942527489=function(){return E((function(){return f(global.global)}),arguments)},_.wbg.__wbindgen_is_undefined=function(_){return void 0===s(_)},_.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return f(new Function(u(_,t)))},_.wbg.__wbg_has_0af94d20077affa2=function(){return E((function(_,t){return Reflect.has(s(_),s(t))}),arguments)},_.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return f(fetch(s(_)))},_.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return f(s(_).fetch(s(t)))},_.wbg.__wbindgen_debug_string=function(_,t){const e=h(S(s(t)),o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbindgen_throw=function(_,t){throw new Error(u(_,t))},_.wbg.__wbindgen_rethrow=function(_){throw w(_)},_.wbg.__wbg_then_a73caa9a87991566=function(_,t,e){return f(s(_).then(s(t),s(e)))},_.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return f(s(_).then(s(t)))},_.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(s(_))},_.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return f(s(_).queueMicrotask)},_.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return f(Promise.resolve(s(_)))},_.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return f(Atomics.waitAsync)},_.wbg.__wbg_new_8cccba86b0f574cb=function(_){return f(new Int32Array(s(_)))},_.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,e){return f(Atomics.waitAsync(s(_),t,e))},_.wbg.__wbg_async_19c0400d97cc72fe=function(_){return s(_).async},_.wbg.__wbg_value_571d60108110e917=function(_){return f(s(_).value)},_.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(_){const t=h("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;P()[_/4+1]=e,P()[_/4+0]=t},_.wbg.__wbg_new_d1187ae36d662ef9=function(){return E((function(_,t){return f(new Worker(u(_,t)))}),arguments)},_.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){s(_).onmessage=s(t)},_.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,e){return f(Array.of(s(_),s(t),s(e)))},_.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return E((function(_,t){s(_).postMessage(s(t))}),arguments)},_.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return f(s(_).data)},_.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return E((function(_,t,e){return f(new Request(u(_,t),s(e)))}),arguments)},_.wbg.__wbg_responseText_c67ed2d48db10769=function(){return E((function(_,t){const e=s(t).responseText;var r=v(e)?0:h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),n=p;P()[_/4+1]=n,P()[_/4+0]=r}),arguments)},_.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return f(V(_,t,538,F))},_.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return f(V(_,t,538,F))},_}function k_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function P_(_,t){return o=_.exports,x_.__wbindgen_wasm_module=t,A=null,k=null,b=null,o.__wbindgen_start(),o}function S_(_,t){if(void 0!==o)return o;const e=v_();k_(e,t),_ instanceof WebAssembly.Module||(_=new WebAssembly.Module(_));return P_(new WebAssembly.Instance(_,e),_)}async function x_(_,t){if(void 0!==o)return o;const e=v_();("string"==typeof _||"function"==typeof Request&&_ instanceof Request||"function"==typeof URL&&_ instanceof URL)&&(_=fetch(_)),k_(e,t);const{instance:r,module:n}=await h_(await _,e);return P_(r,n)}var n=Object.freeze({__proto__:null,Address:U,Execution:q,ExecutionResponse:$,Field:N,KeyPair:L,Metadata:Z,OfflineQuery:X,PrivateKey:G,PrivateKeyCiphertext:t_,Program:r_,ProgramManager:i_,ProvingKey:a_,RecordCiphertext:c_,RecordPlaintext:w_,Signature:b_,Transaction:u_,VerifyingKey:p_,ViewKey:m_,default:x_,initSync:S_,initThreadPool:C,runRayonThread:K,verifyFunctionExecution:z});const V_="assets/aleo_wasm.wasm";const{initThreadPool:F_,Address:T_,Execution:R_,ExecutionResponse:z_,Field:A_,Metadata:O_,OfflineQuery:j_,Private:K_,PrivateKey:C_,PrivateKeyCiphertext:E_,Program:M_,ProvingKey:B_,RecordCiphertext:U_,RecordPlaintext:I_,ProgramManager:q_,Signature:W_,Transaction:$_,ViewKey:D_,VerifyingKey:N_,verifyFunctionExecution:J_}=await(async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,i=V_;return null!=e&&(i=e+/[^\/\\]*$/.exec(i)[0]),null!=t&&(i=t(i)),null!=r?await r(x_,i):await x_(i),n})({importHook:()=>new URL(e(81),e.b)});async function L_(_){null==_&&(_=navigator.hardwareConcurrency),console.info(`Spawning ${_} threads`),await F_(new URL(e(977),e.b),_)}r()}catch(H_){r(H_)}}),1)}}]); +//# sourceMappingURL=258.bundle.js.map \ No newline at end of file diff --git a/258.bundle.js.map b/258.bundle.js.map new file mode 100644 index 000000000..a362a5cd4 --- /dev/null +++ b/258.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"258.bundle.js","mappings":"wOAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,E,uMAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAQ,GAAGA,IAEf,GAAY,UAAR9D,EACA,MAAO,IAAI8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEA,UAAUA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EAClC,YAAY+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACR,GAAGoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAM,wBAAwB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,K,MAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,GAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,K,MAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,K,MAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,EAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,K,MAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,EAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,EAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,EAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,K,MAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,EAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,EAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,QAAIgC,GACA,IAAI8F,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0M,wBAAwBtG,EAAQwB,KAAKd,WAC1C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAI/F,CAAKyB,GACL,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK2M,wBAAwB/E,KAAKd,UAAWL,EAAMG,EAC3D,CAII,WAAIgG,GACA,IAAItD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6M,2BAA2BzG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIqD,CAAQ3H,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK8M,2BAA2BlF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAImG,GACA,IAAIzD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgN,0BAA0B5G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIwD,CAAO9H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKiN,0BAA0BrF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIsG,GACA,IAAI5D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,4BAA4B/G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAI2D,CAASjI,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,4BAA4BxF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqN,gCAAgCjH,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKsN,gCAAgC1F,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAO2G,GACH,IAAIjE,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwN,iBAAiBpH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOkE,GACH,MAAM7M,EAAMZ,EAAK0N,uBACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,qBAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,0BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,0BAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,+BACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,uBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,sBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,qBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,WAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,gBACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,0BAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,+BACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,YAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,iBACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,uBAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,4BACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,sCACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,2BACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,qCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,sCACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,CAII,oBAAOyO,GACH,MAAMzO,EAAMZ,EAAKsP,yBACjB,OAAO7C,EAASpE,OAAOzH,EAC/B,GAGA,MAAM2O,EAA4D,oBAAzBhL,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwP,wBAAwBhO,IAAQ,K,MAK3E,MAAMiO,EAEF,aAAOpH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkH,EAAajH,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB+N,EAAyB/K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByI,EAAyB9K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwP,wBAAwBhO,EACrC,CAKIuK,WAAAA,CAAY2D,GACR,IACI,MAAMtJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkN,EAAY1P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAK2P,iBAAiBvJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIuJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAM1J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBqN,EAAY7P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBsN,EAAY9P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEoJ,EAAOlO,EACb7B,EAAKgQ,0BAA0B5J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzE,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiQ,sBAAsB7J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWgG,GACd,IACI,MAAM9J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0N,EAAGlQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKmQ,wBAAwB/J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyI,EAAapH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+J,EAA0D,oBAAzB7L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqQ,sBAAsB7O,IAAQ,K,MAIzE,MAAM8O,EAEF,aAAOjI,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+H,EAAW9H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB4O,EAAuB5L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsJ,EAAuB3L,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqQ,sBAAsB7O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKuQ,iBAEjB,OADA3I,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO4I,CAAoBC,GACvB,MAAMhK,EAAOX,EAAkB2K,EAAMzQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAK0Q,+BAA+BjK,EAAMG,GACtD,OAAO0J,EAAWjI,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK2Q,uBAAuBvK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4Q,qBAAqBxK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,WAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,uBAAuBlJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOImQ,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKgR,sBAAsBpJ,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASIsQ,IAAAA,CAAK9M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOwQ,CAAaC,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKsR,wBAAwBlL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUImL,YAAAA,CAAaH,GACT,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOqL,CAAyBC,EAAYN,GACxC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAagM,EAAYJ,IACzB,MAAM9K,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4R,oCAAoCxL,EAAQuL,EAAW7K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwL,GAAoE,oBAAzBtN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8R,gCAAgCtQ,IAAQ,K,OAInF,MAAMuQ,EAEF,aAAO1J,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOwJ,EAAqBvJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBqQ,GAAiCrN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+K,GAAiCpN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8R,gCAAgCtQ,EAC7C,CAYI,wBAAOwQ,CAAkBpJ,EAAayI,GAClC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI4L,mBAAAA,CAAoBZ,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKkS,yCAAyC9L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,EAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmS,8BAA8B/L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWyH,GACd,IACI,MAAMvL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKoS,gCAAgChM,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMgM,GAAuD,oBAAzB9N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsS,mBAAmB9Q,IAAQ,K,OAItE,MAAM+Q,EAEF,aAAOlK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgK,EAAQ/J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB6Q,GAAoB7N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuL,GAAoB5N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsS,mBAAmB9Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKwS,mBAAmBpM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuL,EAAQlK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyS,iBAAiBrM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASImJ,WAAAA,CAAYC,GACR,MAAMlM,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK4S,oBAAoBhL,KAAKd,UAAWL,EAAMG,EAEnE,CAuBIiM,YAAAA,GAEI,OAAOlS,EADKX,EAAK8S,qBAAqBlL,KAAKd,WAEnD,CAyCIiM,iBAAAA,CAAkBJ,GACd,IACI,MAAMvM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAKgT,0BAA0B5M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI4M,WAAAA,GACI,IACI,MAAM7M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKkT,oBAAoB9M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI8M,gBAAAA,CAAiBC,GACb,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqT,yBAAyBjN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDIiN,gBAAAA,CAAiBC,GACb,IACI,MAAMnN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB+Q,EAAavT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKwT,yBAAyBpN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOoN,GACH,MAAM7S,EAAMZ,EAAK0T,4BACjB,OAAOnB,EAAQlK,OAAOzH,EAC9B,CAOI+S,EAAAA,GACI,IAAIrK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4T,WAAWxN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6T,gBAAgBzN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOiK,EAAQ5I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyN,OAAAA,CAAQC,GACJpO,EAAaoO,EAAOxB,GAEpB,OAAe,IADHvS,EAAKgU,gBAAgBpM,KAAKd,UAAWiN,EAAMjN,UAE/D,CA0BImN,UAAAA,GAEI,OAAOtT,EADKX,EAAKkU,mBAAmBtM,KAAKd,WAEjD,GAGA,MAAMqN,GAA8D,oBAAzB5P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoU,0BAA0B5S,IAAQ,K,OAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqN,GAA2B1P,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoU,0BAA0B5S,EACvC,CA8BI,iCAAO6S,CAA2BzL,EAAa1C,EAASoO,EAAaC,EAAYvV,EAAKwV,EAASC,EAAiBC,EAAmBC,GAC/HhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzB3I,EAAOsI,EAAW9L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9B+J,EAAON,EAAgBhM,sBAE3B,IAAIuM,EAAO,EACNhS,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChCyO,EAAON,EAAkBjM,sBAE7B,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKmV,0CAA0CvM,EAAY9B,UAAWL,EAAMG,EAAM0N,EAAarI,EAAM4I,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBlP,EAASsO,GAClC,MAAM/N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKqV,qCAAqC5O,EAAMG,EAAM5D,EAAWwR,GAAW,EAAI7S,EAAc6S,IAElH,CAaI,8BAAOc,CAAwB9R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKuV,uCAAuCnP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOsP,CAAuB/M,EAAa1C,EAAS0P,EAAWC,EAAQC,EAAiBC,EAAOvB,EAASxI,EAAa/F,EAAejH,EAAK2V,GACrIhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiW,sCAAsCrN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASC,EAAiBC,EAAO/S,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BtN,EAAa1C,EAAS0P,EAAWC,EAAQvB,EAAaC,EAAYvV,EAAKwV,EAASxI,EAAa/F,EAAewO,EAAiBC,EAAmBC,GAC7KhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1BgK,EAAOhJ,EAAYvD,sBAEvB,IAAIwM,EAAO,EACNjS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5B0O,EAAOhP,EAAcwC,sBAEzB,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuW,yCAAyC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMnT,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB5N,EAAa1C,EAAS0P,EAAWC,EAAQ7W,EAAKwV,EAASxI,EAAa/F,EAAe0O,GAC3GhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B+J,EAAO/I,EAAYvD,sBAEvB,IAAIuM,EAAO,EACNhS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5ByO,EAAO/O,EAAcwC,sBAEzB,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKyW,oCAAoC7N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAShB,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBxQ,EAAS0P,GAChC,IACI,MAAMxP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb7B,EAAK2W,mCAAmCvQ,EAAQK,EAAMG,EAAMqF,EAAM8D,GAClE,IAAIhJ,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOuQ,CAAqBhO,EAAaiO,EAAUC,EAAUxC,EAAaC,EAAYvV,EAAK+X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjKhP,EAAaiD,EAAaC,GAC1BlD,EAAakR,EAAUjC,IACvB,IAAInO,EAAOoQ,EAASpO,qBACpB9C,EAAamR,EAAUlC,IACvB,IAAI3I,EAAO6K,EAASrO,qBACpB,IAAIoM,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAW+T,KACZpR,EAAaoR,EAAkB/L,IAC/BgK,EAAO+B,EAAiBtO,sBAE5B,IAAIwM,EAAO,EACNjS,EAAWgU,KACZrR,EAAaqR,EAAoBzQ,IACjC0O,EAAO+B,EAAmBvO,sBAE9B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiX,oCAAoCrO,EAAY9B,UAAWL,EAAMwF,EAAMqI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBtO,EAAauO,EAAcC,EAAepY,EAAKqY,EAAmBC,EAAqB3C,GAChHhP,EAAaiD,EAAaC,GAC1BlD,EAAayR,EAAexC,IAC5B,IAAInO,EAAO2Q,EAAc3O,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACX,IAAIgT,EAAO,EACN7R,EAAWqU,KACZ1R,EAAa0R,EAAmBrM,IAChC6J,EAAOwC,EAAkB5O,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWsU,KACZ3R,EAAa2R,EAAqB/Q,IAClCwO,EAAOuC,EAAoB7O,sBAE/B,IAAIuM,EAAO,EACNhS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BF,EAAOL,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuX,qCAAqC3O,EAAY9B,UAAWqQ,EAAc1Q,EAAMwF,EAAM8D,EAAM8E,EAAME,EAAMC,GAEjI,CAgCI,+BAAOwC,CAAyB5O,EAAa6O,EAAgBC,EAAWC,EAAeP,EAAe9C,EAAaC,EAAYvV,EAAK4Y,EAAsBC,EAAwBpD,EAAiBC,EAAmBC,GAClNhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkBkV,EAAW1X,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBmV,EAAe3X,EAAK0G,kBAAmB1G,EAAK2G,oBACrEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAexC,IAC5BC,EAAOuC,EAAc3O,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBG,EAAOR,EAAW9L,sBAEtB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW4U,KACZjS,EAAaiS,EAAsB5M,IACnCiK,EAAO2C,EAAqBnP,sBAEhC,IAAI2N,EAAO,EACNpT,EAAW6U,KACZlS,EAAakS,EAAwBtR,IACrC6P,EAAOyB,EAAuBpP,sBAElC,IAAI4N,EAAO,EACNrT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BqL,EAAO5B,EAAgBhM,sBAE3B,IAAI6N,EAAO,EACNtT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC+P,EAAO5B,EAAkBjM,sBAE7B,IAAIqP,EAAO,EACN9U,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5B4C,EAAOnD,EAAclM,sBAGzB,OAAO9H,EADKX,EAAK+X,wCAAwCnP,EAAY9B,UAAW2Q,EAAgBhR,EAAMG,EAAMqF,EAAM8D,EAAM8E,EAAMP,EAAaS,EAAMC,EAAMgB,EAAMf,EAAMmB,EAAMC,EAAMC,EAAMwB,GAE7L,CAeI,wBAAOE,CAAkBpP,EAAa1C,EAASC,EAAa0P,EAAQrB,GAChE7O,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EAEb,OAAOlB,EADKX,EAAKiY,iCAAiCrP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAS7S,EAAWwR,GAAW,EAAI7S,EAAc6S,IAExK,GAGA,MAAM0D,GAA0D,oBAAzB3T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmY,sBAAsB3W,IAAQ,K,OAIzE,MAAM4W,EAEF,aAAO/P,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6P,EAAW5P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0W,GAAuB1T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoR,GAAuBzT,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmY,sBAAsB3W,EACnC,CAWI6W,kBAAAA,GAEI,OAAe,IADHrY,EAAKsY,8BAA8B1Q,KAAKd,UAE5D,CAWIyR,qBAAAA,GAEI,OAAe,IADHvY,EAAKwY,iCAAiC5Q,KAAKd,UAE/D,CAWI2R,yBAAAA,GAEI,OAAe,IADHzY,EAAK0Y,qCAAqC9Q,KAAKd,UAEnE,CAWI6R,kBAAAA,GAEI,OAAe,IADH3Y,EAAK4Y,8BAA8BhR,KAAKd,UAE5D,CAWI+R,iBAAAA,GAEI,OAAe,IADH7Y,EAAK8Y,6BAA6BlR,KAAKd,UAE3D,CAWIiS,iBAAAA,GAEI,OAAe,IADH/Y,EAAKgZ,6BAA6BpR,KAAKd,UAE3D,CAWImS,YAAAA,GAEI,OAAe,IADHjZ,EAAKkZ,wBAAwBtR,KAAKd,UAEtD,CAWIqS,yBAAAA,GAEI,OAAe,IADHnZ,EAAKoZ,qCAAqCxR,KAAKd,UAEnE,CAWIuS,aAAAA,GAEI,OAAe,IADHrZ,EAAKsZ,yBAAyB1R,KAAKd,UAEvD,CAWIyS,uBAAAA,GAEI,OAAe,IADHvZ,EAAKwZ,mCAAmC5R,KAAKd,UAEjE,CAWI2S,+BAAAA,GAEI,OAAe,IADHzZ,EAAK0Z,2CAA2C9R,KAAKd,UAEzE,CAWI6S,sBAAAA,GAEI,OAAe,IADH3Z,EAAK4Z,kCAAkChS,KAAKd,UAEhE,CAWI+S,8BAAAA,GAEI,OAAe,IADH7Z,EAAK8Z,0CAA0ClS,KAAKd,UAExE,CAWIiT,+BAAAA,GAEI,OAAe,IADH/Z,EAAKga,2CAA2CpS,KAAKd,UAEzE,CAWImT,oBAAAA,GAEI,OAAe,IADHja,EAAKka,gCAAgCtS,KAAKd,UAE9D,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoa,oBAAoBhU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAKsa,gBAAgB1S,KAAKd,WACtC,OAAOsR,EAAW/P,OAAOzH,EACjC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAKya,qBAAqBrU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK2a,sBAAsBvU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6a,mBAAmBzU,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+a,oBAAoB3U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyR,GAAgE,oBAAzBzW,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKib,4BAA4BzZ,IAAQ,K,OAI/E,MAAM0Z,EAEF,aAAO7S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2S,EAAiB1S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChBwZ,GAA6BxW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkU,GAA6BvW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKib,4BAA4BzZ,EACzC,CASI,iBAAO0I,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKob,4BAA4BhV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkU,EAAiB7S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqb,0BAA0BjV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI+R,OAAAA,CAAQtS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKub,yBAAyBnV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4N,GAAgBvM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASImV,OAAAA,CAAQxS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAKyb,yBAAyB7T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM4U,GAA+D,oBAAzBnX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2b,2BAA2Bna,IAAQ,K,OAI9E,MAAMoa,EAEF,aAAOvT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqT,EAAgBpT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBka,GAA4BlX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4U,GAA4BjX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2b,2BAA2Bna,EACxC,CAMIqO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAK6b,2BAA2BzV,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GAC1E,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO8U,EAAMzT,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK+b,2BAA2B3V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4U,EAAgBvT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgc,yBAAyB5V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI0S,YAAAA,GACI,MAAMrb,EAAMZ,EAAKkc,6BAA6BtU,KAAKd,WACnD,OAAO2O,OAAOC,QAAQ,GAAI9U,EAClC,CAOIub,KAAAA,GACI,IAAI7S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoc,sBAAsBhW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI8S,kBAAAA,CAAmBzT,EAAagL,EAAYR,GACxC,IAAIkJ,EACAC,EACJ,IACI,MAAMnW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAKwc,mCAAmCpW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzG,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpC2O,EAAOhO,EACPoP,EAAOnP,EACX,GAAIyV,EAEA,MADA1H,EAAO,EAAGoB,EAAO,EACXxV,EAAW6U,GAIrB,OAFA8G,EAAcvH,EACdwH,EAAcpG,EACP5U,EAAmBwT,EAAMoB,EAC5C,CAAU,QACEnW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB6S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBnY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2c,qBAAqBnb,IAAQ,K,OAIxE,MAAMob,EAEF,aAAOvU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqU,EAAUpU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBkb,GAAsBlY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4V,GAAsBjY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2c,qBAAqBnb,EAClC,CAWI,WAAO0P,CAAKtI,EAAaxE,GACrBuB,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOgW,EAAUvU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS8R,GACtB,MAAMxK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK6c,iBAAiBjV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK8c,sBAAsBrW,EAAMG,GAC7C,OAAOgW,EAAUvU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+c,oBAAoB3W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyT,GAA2D,oBAAzBzY,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKid,uBAAuBzb,IAAQ,K,OAO1E,MAAM0b,EAEF,aAAO7U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2U,EAAY1U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChBwb,GAAwBxY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkW,GAAwBvY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKid,uBAAuBzb,EACpC,CASI,iBAAO0I,CAAWiT,GACd,IACI,MAAM/W,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2a,EAAand,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKod,uBAAuBhX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkW,EAAY7U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqd,qBAAqBjX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI+T,aAAAA,GACI,IAAIhU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKud,0BAA0BnX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIiU,eAAAA,GACI,IAAIlU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyd,4BAA4BrX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMmU,GAA4D,oBAAzBnZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2d,wBAAwBnc,IAAQ,K,OAI3E,MAAMoc,EAEF,aAAOvV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqV,EAAapV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBkc,GAAyBlZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4W,GAAyBjZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2d,wBAAwBnc,EACrC,CAOI,yBAAOqc,GACH,MAAMjd,EAAMZ,EAAK8d,kCACjB,OAAOF,EAAavV,OAAOzH,EACnC,CAOI,4BAAOmd,GACH,MAAMnd,EAAMZ,EAAKge,qCACjB,OAAOJ,EAAavV,OAAOzH,EACnC,CAOI,gCAAOqd,GACH,MAAMrd,EAAMZ,EAAKke,yCACjB,OAAON,EAAavV,OAAOzH,EACnC,CAOI,yBAAOud,GACH,MAAMvd,EAAMZ,EAAKoe,kCACjB,OAAOR,EAAavV,OAAOzH,EACnC,CAOI,wBAAOyd,GACH,MAAMzd,EAAMZ,EAAKse,iCACjB,OAAOV,EAAavV,OAAOzH,EACnC,CAOI,wBAAO2d,GACH,MAAM3d,EAAMZ,EAAKwe,iCACjB,OAAOZ,EAAavV,OAAOzH,EACnC,CAOI,mBAAO6d,GACH,MAAM7d,EAAMZ,EAAK0e,4BACjB,OAAOd,EAAavV,OAAOzH,EACnC,CAOI,gCAAO+d,GACH,MAAM/d,EAAMZ,EAAK4e,yCACjB,OAAOhB,EAAavV,OAAOzH,EACnC,CAOI,oBAAOie,GACH,MAAMje,EAAMZ,EAAK8e,6BACjB,OAAOlB,EAAavV,OAAOzH,EACnC,CAOI,8BAAOme,GACH,MAAMne,EAAMZ,EAAKgf,uCACjB,OAAOpB,EAAavV,OAAOzH,EACnC,CAOI,sCAAOqe,GACH,MAAMre,EAAMZ,EAAKkf,+CACjB,OAAOtB,EAAavV,OAAOzH,EACnC,CAOI,6BAAOue,GACH,MAAMve,EAAMZ,EAAKof,sCACjB,OAAOxB,EAAavV,OAAOzH,EACnC,CAOI,qCAAOye,GACH,MAAMze,EAAMZ,EAAKsf,8CACjB,OAAO1B,EAAavV,OAAOzH,EACnC,CAOI,sCAAO2e,GACH,MAAM3e,EAAMZ,EAAKwf,+CACjB,OAAO5B,EAAavV,OAAOzH,EACnC,CAOI,2BAAO6e,GACH,MAAM7e,EAAMZ,EAAK0f,oCACjB,OAAO9B,EAAavV,OAAOzH,EACnC,CAOI+e,oBAAAA,GAEI,OAAe,IADH3f,EAAK4f,kCAAkChY,KAAKd,UAEhE,CAOI+Y,uBAAAA,GAEI,OAAe,IADH7f,EAAK8f,qCAAqClY,KAAKd,UAEnE,CAOIiZ,2BAAAA,GAEI,OAAe,IADH/f,EAAKggB,yCAAyCpY,KAAKd,UAEvE,CAOImZ,oBAAAA,GAEI,OAAe,IADHjgB,EAAKkgB,kCAAkCtY,KAAKd,UAEhE,CAOIqZ,mBAAAA,GAEI,OAAe,IADHngB,EAAKogB,iCAAiCxY,KAAKd,UAE/D,CAOIuZ,mBAAAA,GAEI,OAAe,IADHrgB,EAAKsgB,iCAAiC1Y,KAAKd,UAE/D,CAOIyZ,cAAAA,GAEI,OAAe,IADHvgB,EAAKwgB,4BAA4B5Y,KAAKd,UAE1D,CAOI2Z,2BAAAA,GAEI,OAAe,IADHzgB,EAAK0gB,yCAAyC9Y,KAAKd,UAEvE,CAOI6Z,eAAAA,GAEI,OAAe,IADH3gB,EAAK4gB,6BAA6BhZ,KAAKd,UAE3D,CAOI+Z,yBAAAA,GAEI,OAAe,IADH7gB,EAAK8gB,uCAAuClZ,KAAKd,UAErE,CAOIia,iCAAAA,GAEI,OAAe,IADH/gB,EAAKghB,+CAA+CpZ,KAAKd,UAE7E,CAOIma,wBAAAA,GAEI,OAAe,IADHjhB,EAAKkhB,sCAAsCtZ,KAAKd,UAEpE,CAOIqa,gCAAAA,GAEI,OAAe,IADHnhB,EAAKohB,8CAA8CxZ,KAAKd,UAE5E,CAOIua,iCAAAA,GAEI,OAAe,IADHrhB,EAAKshB,+CAA+C1Z,KAAKd,UAE7E,CAOIya,sBAAAA,GAEI,OAAe,IADHvhB,EAAKwhB,oCAAoC5Z,KAAKd,UAElE,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyhB,sBAAsBrb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAK0hB,kBAAkB9Z,KAAKd,WACxC,OAAO8W,EAAavV,OAAOzH,EACnC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK2hB,uBAAuBvb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4hB,wBAAwBxb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6hB,qBAAqBzb,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,sBAAsB1b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMwY,GAAuD,oBAAzBxd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKgiB,mBAAmBxgB,IAAQ,K,OAGtE,MAAMygB,EAEF,aAAO5Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO0Z,EAAQzZ,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBugB,GAAoBvd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBib,GAAoBtd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKgiB,mBAAmBxgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,GAC1B,MAAMjI,EAAMZ,EAAK8Q,uBAAuBlI,EAAY9B,WACpD,OAAOmb,EAAQ5Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKkiB,oBAAoBzb,EAAMG,GAC3C,OAAOqb,EAAQ5Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmiB,kBAAkB/b,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIwH,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASI0a,OAAAA,CAAQ3J,GACJ,IAAIyQ,EACAC,EACJ,IACI,MAAMjc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKsiB,gBAAgBlc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACP+N,EAAO9N,EACX,GAAIyV,EAEA,MADA5H,EAAO,EAAGC,EAAO,EACXnU,EAAW6U,GAIrB,OAFA4M,EAAcvN,EACdwN,EAAcvN,EACPvT,EAAmBsT,EAAMC,EAC5C,CAAU,QACE9U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB2Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,GAAWvjB,EAAQuV,GAC9B,GAAwB,mBAAbiO,UAA2BxjB,aAAkBwjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB1jB,EAAQuV,EAEtE,CAAc,MAAO3M,GACL,GAA0C,oBAAtC5I,EAAO2jB,QAAQhe,IAAI,gBAInB,MAAMiD,EAHNgb,QAAQC,KAAK,oMAAqMjb,EAKtO,CAGQ,MAAM2S,QAAcvb,EAAO8jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOhG,EAEpD,CAAW,CACH,MAAM5O,QAAiB8c,YAAYM,YAAY/jB,EAAQuV,GAEvD,OAAI5O,aAAoB8c,YAAYO,SACzB,CAAErd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASsd,KACL,MAAM1O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ2O,IAAIC,2BAA6B,SAASne,GAC9CtE,EAAWsE,EACnB,EACIuP,EAAQ2O,IAAIE,2BAA6B,WAAa,OAAO3b,GAAY,WAErE,OAAO/F,EADK,IAAI2hB,eAExB,GAAOC,UAAU,EACb/O,EAAQ2O,IAAIK,wCAA0C,WAAa,OAAO9b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMwe,iBAAiBliB,EAAmB2D,EAAMO,GAClE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIO,4BAA8B,WAAa,OAAOhc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,EAAMC,GAC9GvjB,EAAU4E,GAAM4e,KAAKtiB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACb/O,EAAQ2O,IAAIW,4BAA8B,WAAa,OAAOpc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM8e,MACxB,GAAOR,UAAU,EACb/O,EAAQ2O,IAAIa,gCAAkC,WAAa,OAAOtc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMgf,SAEpC,GAAOV,UAAU,EACb/O,EAAQ2O,IAAIe,8BAAgC,WAAa,OAAOxc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMkf,MAEpC,GAAOZ,UAAU,EACb/O,EAAQ2O,IAAIiB,2BAA6B,WAErC,OAAOziB,EADK,IAAI2G,OAExB,EACIkM,EAAQ2O,IAAIkB,sBAAwB,SAASpf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIsP,EAAQ2O,IAAImB,2BAA6B,WAAa,OAAO5c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY8e,QAAQliB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIqB,2BAA6B,WAAa,OAAO9c,GAAY,WAErE,OAAO/F,EADK,IAAI8iB,QAExB,GAAOlB,UAAU,EACb/O,EAAQ2O,IAAIuB,4BAA8B,SAASzf,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIuP,EAAQ2O,IAAIwB,2BAA6B,WAAa,OAAOjd,GAAY,WAErE,OAAO/F,EADK,IAAIijB,gBAExB,GAAOrB,UAAU,EACb/O,EAAQ2O,IAAI0B,8BAAgC,SAAS5f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM6f,OAEpC,EACItQ,EAAQ2O,IAAI4B,8BAAgC,WAAa,OAAOrd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,GAC1GtjB,EAAU4E,GAAM+f,OAAOzjB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GACxF,GAAOJ,UAAU,EACb/O,EAAQ2O,IAAI8B,2CAA6C,SAAShgB,GAC9D,IAAIigB,EACJ,IACIA,EAAS7kB,EAAU4E,aAAiBwd,QAChD,CAAU,MAAOte,GACL+gB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI1Q,EAAQ2O,IAAIgC,8BAAgC,SAASlgB,GAEjD,OADY5E,EAAU4E,GAAMkf,MAEpC,EACI3P,EAAQ2O,IAAIiC,2BAA6B,SAASngB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIkC,+BAAiC,SAASpgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM2d,QAEpC,EACIpO,EAAQ2O,IAAImC,gCAAkC,WAE1C,OAAO3jB,EADK4jB,OAAOC,SAE3B,EACIhR,EAAQ2O,IAAIsC,2BAA6B,WAAa,OAAO/d,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK4iB,QAAQ3f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIuC,uBAAyB,SAASzgB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIwC,4BAA8B,WAAa,OAAOje,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyC,qBAAuB,SAAS3gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIkR,EAAQ2O,IAAI0C,4BAA8B,SAAS5gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM6gB,KAEpC,EACItR,EAAQ2O,IAAI4C,4BAA8B,WAAa,OAAOre,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM6gB,OAEpC,GAAOvC,UAAU,EACb/O,EAAQ2O,IAAI6C,4BAA8B,SAAS/gB,GAE/C,OADY5E,EAAU4E,GAAMghB,IAEpC,EACIzR,EAAQ2O,IAAI+C,6BAA+B,SAASjhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAIiD,6BAA+B,SAASnhB,GAChD5E,EAAU4E,GAAMohB,OACxB,EACI7R,EAAQ2O,IAAImD,iCAAmC,WAAa,OAAO5e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOse,UAAU,EACb/O,EAAQ2O,IAAIoD,sBAAwB,SAASthB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIqD,2BAA6B,SAASvhB,EAAMC,GACpD2d,QAAQ4D,IAAIllB,EAAmB0D,EAAMC,GAC7C,EACIsP,EAAQ2O,IAAIuD,2BAA6B,SAASzhB,GAE9C,OAAOtD,EADK8T,OAAOC,QAAQ,GAAIzQ,GAEvC,EACIuP,EAAQ2O,IAAIwD,4BAA8B,WAAa,OAAOjf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIyD,sBAAwB,SAAS3hB,GAEzC,OAAOtD,EADKklB,GAAYxe,OAAOpD,GAEvC,EACIuP,EAAQ2O,IAAI2D,kBAAoB,SAAS7hB,GAErC,OAAOtD,EADKkJ,EAAQxC,OAAOpD,GAEnC,EACIuP,EAAQ2O,IAAI4D,kBAAoB,WAE5B,OAAOplB,EADKqlB,GAAWC,uBAE/B,EACIzS,EAAQ2O,IAAI+D,kBAAoB,WAE5B,OAAOvlB,EADK3B,EAAKd,OAEzB,EACIsV,EAAQ2O,IAAIgE,mCAAqC,SAASliB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIwM,EAAQ2O,IAAIiE,4BAA8B,SAASniB,GAE/C,OAAOtD,EADK0lB,EAAkBhf,OAAOpD,GAE7C,EACIuP,EAAQ2O,IAAImE,qCAAuC,SAASriB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIuP,EAAQ2O,IAAIoE,2BAA6B,SAAStiB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI+O,EAAQ2O,IAAIqE,mBAAqB,SAASviB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACI0P,EAAQ2O,IAAIsE,2BAA6B,WAErC,OAAO9lB,EADK,IAAIzB,MAExB,EACIsU,EAAQ2O,IAAIuE,4BAA8B,SAASziB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIsP,EAAQ2O,IAAIwE,mCAAqC,WAAa,OAAOjgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM8d,cAEpC,GAAOQ,UAAU,EACb/O,EAAQ2O,IAAIyE,2BAA6B,SAAS3iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI0E,8BAAgC,SAAS5iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI2E,2BAA6B,SAAS7iB,EAAMC,GACpD,IACI,IAAI6iB,EAAS,CAACjjB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN4oB,CAAC/iB,EAAMC,KACb,MAAMJ,EAAIijB,EAAOjjB,EACjBijB,EAAOjjB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGijB,EAAOhjB,EAAGE,EAAMC,EAChE,CAAkB,QACE6iB,EAAOjjB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEmnB,EAAOjjB,EAAIijB,EAAOhjB,EAAI,CAClC,CACA,EACIyP,EAAQ2O,IAAI8E,sBAAwB,SAAShjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIuP,EAAQ2O,IAAI+E,2BAA6B,WAErC,OAAOvmB,EADK,IAAIT,MAExB,EACIsT,EAAQ2O,IAAIgF,6BAA+B,SAASljB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIiF,6BAA+B,SAASnjB,EAAMC,GACtD,IAAImjB,EACAC,EACJ,IACID,EAAcpjB,EACdqjB,EAAcpjB,EACd2d,QAAQ0F,MAAMhnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB4e,EAAaC,EAAa,EAC3D,CACA,EACI9T,EAAQ2O,IAAIqF,8BAAgC,SAASvjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACImT,EAAQ2O,IAAIsF,kDAAoD,SAASxjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI+O,EAAQ2O,IAAIuF,sCAAwC,WAAa,OAAOhhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM0jB,eAAehoB,EAAWuE,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyF,gCAAkC,SAAS3jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI+O,EAAQ2O,IAAI0F,uCAAyC,WAAa,OAAOnhB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM6jB,gBAAgBzoB,EAAU6E,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI4F,2BAA6B,SAAS9jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI+O,EAAQ2O,IAAI6F,8BAAgC,SAAS/jB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMgkB,OAEpC,EACIzU,EAAQ2O,IAAI+F,+BAAiC,SAASjkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMkkB,QAEpC,EACI3U,EAAQ2O,IAAIiG,gCAAkC,SAASnkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMokB,SAEpC,EACI7U,EAAQ2O,IAAImG,4BAA8B,SAASrkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMskB,KAEpC,EACI/U,EAAQ2O,IAAIqG,qBAAuB,SAASvkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIsG,+BAAiC,WAAa,OAAO/hB,GAAY,WAEzE,OAAO/F,EADK1C,OAAOyqB,QAE3B,GAAOnG,UAAU,EACb/O,EAAQ2O,IAAIwG,gCAAkC,SAAS1kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM2kB,SAEpC,EACIpV,EAAQ2O,IAAI0G,qCAAuC,SAAS5kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIuP,EAAQ2O,IAAI2G,8BAAgC,SAAS7kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI4G,2BAA6B,SAAS9kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIsP,EAAQ2O,IAAI6G,4BAA8B,WAAa,OAAOtiB,GAAY,WAEtE,OAAO/F,EADKsoB,KAAKA,KAEzB,GAAO1G,UAAU,EACb/O,EAAQ2O,IAAI+G,8BAAgC,WAAa,OAAOxiB,GAAY,WAExE,OAAO/F,EADKwoB,OAAOA,OAE3B,GAAO5G,UAAU,EACb/O,EAAQ2O,IAAIiH,kCAAoC,WAAa,OAAO1iB,GAAY,WAE5E,OAAO/F,EADK0oB,WAAWA,WAE/B,GAAO9G,UAAU,EACb/O,EAAQ2O,IAAImH,8BAAgC,WAAa,OAAO5iB,GAAY,WAExE,OAAO/F,EADK4oB,OAAOA,OAE3B,GAAOhH,UAAU,EACb/O,EAAQ2O,IAAIqH,wBAA0B,SAASvlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIuP,EAAQ2O,IAAIsH,iCAAmC,SAASxlB,EAAMC,GAE1D,OAAOvD,EADK,IAAI+oB,SAASnpB,EAAmB0D,EAAMC,IAE1D,EACIsP,EAAQ2O,IAAIwH,2BAA6B,WAAa,OAAOjjB,GAAY,SAAUzC,EAAMC,GAErF,OADYqf,QAAQqG,IAAIvqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI0H,6BAA+B,SAAS5lB,GAEhD,OAAOtD,EADKmpB,MAAMzqB,EAAU4E,IAEpC,EACIuP,EAAQ2O,IAAI4H,6BAA+B,SAAS9lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM6lB,MAAMzqB,EAAU6E,IAEpD,EACIsP,EAAQ2O,IAAI6H,wBAA0B,SAAS/lB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAI8H,iBAAmB,SAAShmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIsP,EAAQ2O,IAAI+H,mBAAqB,SAASjmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIuP,EAAQ2O,IAAIgI,4BAA8B,SAASlmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI+O,EAAQ2O,IAAIkI,4BAA8B,SAASpmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,IAEnD,EACIsP,EAAQ2O,IAAImI,sCAAwC,SAASrmB,GACzDsmB,eAAelrB,EAAU4E,GACjC,EACIuP,EAAQ2O,IAAIqI,sCAAwC,SAASvmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMsmB,eAEpC,EACI/W,EAAQ2O,IAAIsI,+BAAiC,SAASxmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIuP,EAAQ2O,IAAIuI,iCAAmC,WAE3C,OAAO/pB,EADKgqB,QAAQC,UAE5B,EACIpX,EAAQ2O,IAAI0I,2BAA6B,SAAS5mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI2I,iCAAmC,SAAS7mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKgqB,QAAQC,UAAUvrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI+O,EAAQ2O,IAAI4I,6BAA+B,SAAS9mB,GAEhD,OADY5E,EAAU4E,GAAMsd,KAEpC,EACI/N,EAAQ2O,IAAI6I,6BAA+B,SAAS/mB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAI8I,iCAAmC,SAAShnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC0pB,mBAAmB,6OAO5BlsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIgJ,2BAA6B,WAAa,OAAOzkB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIiJ,oCAAsC,SAASnnB,EAAMC,GAC7D7E,EAAU4E,GAAMonB,UAAYhsB,EAAU6E,EAC9C,EACIsP,EAAQ2O,IAAImJ,0BAA4B,SAASrnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMqsB,GAAGlsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI+O,EAAQ2O,IAAIqJ,mCAAqC,WAAa,OAAO9kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIsJ,4BAA8B,SAASxnB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMynB,KAEpC,EACIlY,EAAQ2O,IAAIwJ,yCAA2C,WAAa,OAAOjlB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIirB,QAAQrrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAI0J,oCAAsC,WAAa,OAAOnlB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM4nB,aAC5B,IAAI7gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOsX,UAAU,EACb/O,EAAQ2O,IAAI4J,+BAAiC,SAAS9nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACIgP,EAAQ2O,IAAI6J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWgP,CACX,CAEA,SAASyY,GAAkBzY,EAAS0Y,GAChC1Y,EAAQ2O,IAAIjkB,OAASguB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,GAAoB3nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS4nB,QAChBxG,GAAWC,uBAAyBhoB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAKytB,mBACEztB,CACX,CAEA,SAAS0tB,GAASzuB,EAAQiuB,GACtB,QAAa9sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMwU,EAAU0O,KAEhB+J,GAAkBzY,EAAS0Y,GAErBjuB,aAAkByjB,YAAYiL,SAChC1uB,EAAS,IAAIyjB,YAAYiL,OAAO1uB,IAKpC,OAAOsuB,GAFU,IAAI7K,YAAYO,SAAShkB,EAAQuV,GAEbvV,EACzC,CAEAsjB,eAAeyE,GAAW4G,EAAOV,GAC7B,QAAa9sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMwU,EAAU0O,MAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,GAAkBzY,EAAS0Y,GAE3B,MAAM,SAAEtnB,EAAQ,OAAE3G,SAAiBujB,SAAiBoL,EAAOpZ,GAE3D,OAAO+Y,GAAoB3nB,EAAU3G,EACzC,CAEA,IAAIuuB,EAAuBllB,OAAOwlB,OAAO,CACrCC,UAAW,KACX3lB,QAAS6I,EACTjH,UAAW1D,EACXgE,kBAAmB+c,EACnB5b,MAAOqQ,EACPjR,QAASA,EACT4B,SAAUuhB,EACVve,aAAcyF,EACd5E,WAAYzH,EACZkJ,qBAAsBR,GACtBgB,QAAS/L,GACTynB,eAAgBC,GAChB9V,WAAYpN,GACZkQ,iBAAkBiT,GAClBvS,gBAAiBhH,GACjBgI,UAAWhT,GACXsT,YAAa2J,GACbjJ,aAAcrX,GACd0b,QAAShZ,GACTmlB,QAASpH,GACT0G,SAAUA,GACVjmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMsoB,GAAY,wBC57Ib,MACD5mB,eAAgB6mB,GAAkB,QAClClmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACRgD,GAAY,QACZ8e,GAAO,WACPje,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACP6F,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZ/W,SD26IoB0b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY7qB,KAAK+qB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAe3H,GAAY4H,SAG3B5H,GAAW4H,GAGdpB,CAAO,EC97IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,aAIvBtL,eAAe9a,GAAeqnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAK,YAAYH,mBAEnBR,GAAmB,IAAIT,IAAI,YAA+BiB,EACpE,C","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","__wbg_get_metadata_name","__wbg_set_metadata_name","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","log","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_transaction_new","Transaction$1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info"],"sourceRoot":""} \ No newline at end of file diff --git a/286.bundle.js b/286.bundle.js new file mode 100644 index 000000000..93e36ecd6 --- /dev/null +++ b/286.bundle.js @@ -0,0 +1,2 @@ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[286],{286:(e,n,t)=>{t.r(n),t.d(n,{CLSThresholds:()=>P,FCPThresholds:()=>w,FIDThresholds:()=>ne,INPThresholds:()=>j,LCPThresholds:()=>G,TTFBThresholds:()=>Q,onCLS:()=>A,onFCP:()=>I,onFID:()=>te,onINP:()=>z,onLCP:()=>K,onTTFB:()=>V});var r,i,o,a,c,u=-1,s=function(e){addEventListener("pageshow",(function(n){n.persisted&&(u=n.timeStamp,e(n))}),!0)},f=function(){var e=self.performance&&performance.getEntriesByType&&performance.getEntriesByType("navigation")[0];if(e&&e.responseStart>0&&e.responseStart=0?r="back-forward-cache":t&&(document.prerendering||d()>0?r="prerender":document.wasDiscarded?r="restore":t.type&&(r=t.type.replace(/_/g,"-"))),{name:e,value:void 0===n?-1:n,rating:"good",delta:0,entries:[],id:"v4-".concat(Date.now(),"-").concat(Math.floor(8999999999999*Math.random())+1e12),navigationType:r}},p=function(e,n,t){try{if(PerformanceObserver.supportedEntryTypes.includes(e)){var r=new PerformanceObserver((function(e){Promise.resolve().then((function(){n(e.getEntries())}))}));return r.observe(Object.assign({type:e,buffered:!0},t||{})),r}}catch(e){}},v=function(e,n,t,r){var i,o;return function(a){n.value>=0&&(a||r)&&((o=n.value-(i||0))||void 0===i)&&(i=n.value,n.delta=o,n.rating=function(e,n){return e>n[1]?"poor":e>n[0]?"needs-improvement":"good"}(n.value,t),e(n))}},m=function(e){requestAnimationFrame((function(){return requestAnimationFrame((function(){return e()}))}))},h=function(e){document.addEventListener("visibilitychange",(function(){"hidden"===document.visibilityState&&e()}))},g=function(e){var n=!1;return function(){n||(e(),n=!0)}},T=-1,y=function(){return"hidden"!==document.visibilityState||document.prerendering?1/0:0},E=function(e){"hidden"===document.visibilityState&&T>-1&&(T="visibilitychange"===e.type?e.timeStamp:0,b())},C=function(){addEventListener("visibilitychange",E,!0),addEventListener("prerenderingchange",E,!0)},b=function(){removeEventListener("visibilitychange",E,!0),removeEventListener("prerenderingchange",E,!0)},L=function(){return T<0&&(T=y(),C(),s((function(){setTimeout((function(){T=y(),C()}),0)}))),{get firstHiddenTime(){return T}}},S=function(e){document.prerendering?addEventListener("prerenderingchange",(function(){return e()}),!0):e()},w=[1800,3e3],I=function(e,n){n=n||{},S((function(){var t,r=L(),i=l("FCP"),o=p("paint",(function(e){e.forEach((function(e){"first-contentful-paint"===e.name&&(o.disconnect(),e.startTimer.value&&(r.value=i,r.entries=o,t())},c=p("layout-shift",a);c&&(t=v(e,r,P,n.reportAllChanges),h((function(){a(c.takeRecords()),t(!0)})),s((function(){i=0,r=l("CLS",0),t=v(e,r,P,n.reportAllChanges),m((function(){return t()}))})),setTimeout(t,0))})))},F=0,k=1/0,M=0,D=function(e){e.forEach((function(e){e.interactionId&&(k=Math.min(k,e.interactionId),M=Math.max(M,e.interactionId),F=M?(M-k)/7+1:0)}))},B=function(){return r?F:performance.interactionCount||0},R=function(){"interactionCount"in performance||r||(r=p("event",D,{type:"event",buffered:!0,durationThreshold:0}))},x=[],H=new Map,N=0,q=[],O=function(e){if(q.forEach((function(n){return n(e)})),e.interactionId||"first-input"===e.entryType){var n=x[x.length-1],t=H.get(e.interactionId);if(t||x.length<10||e.duration>n.latency){if(t)e.duration>t.latency?(t.entries=[e],t.latency=e.duration):e.duration===t.latency&&e.startTime===t.entries[0].startTime&&t.entries.push(e);else{var r={id:e.interactionId,latency:e.duration,entries:[e]};H.set(r.id,r),x.push(r)}x.sort((function(e,n){return n.latency-e.latency})),x.length>10&&x.splice(10).forEach((function(e){return H.delete(e.id)}))}}},_=function(e){var n=self.requestIdleCallback||self.setTimeout,t=-1;return e=g(e),"hidden"===document.visibilityState?e():(t=n(e),h(e)),t},j=[200,500],z=function(e,n){"PerformanceEventTiming"in self&&"interactionId"in PerformanceEventTiming.prototype&&(n=n||{},S((function(){var t;R();var r,i=l("INP"),o=function(e){_((function(){e.forEach(O);var n=function(){var e=Math.min(x.length-1,Math.floor((B()-N)/50));return x[e]}();n&&n.latency!==i.value&&(i.value=n.latency,i.entries=n.entries,r())}))},a=p("event",o,{durationThreshold:null!==(t=n.durationThreshold)&&void 0!==t?t:40});r=v(e,i,j,n.reportAllChanges),a&&(a.observe({type:"first-input",buffered:!0}),h((function(){o(a.takeRecords()),r(!0)})),s((function(){N=B(),x.length=0,H.clear(),i=l("INP"),r=v(e,i,j,n.reportAllChanges)})))})))},G=[2500,4e3],J={},K=function(e,n){n=n||{},S((function(){var t,r=L(),i=l("LCP"),o=function(e){n.reportAllChanges||(e=e.slice(-1)),e.forEach((function(e){e.startTime=0&&o1e12?new Date:performance.now())-e.timeStamp;"pointerdown"==e.type?function(e,n){var t=function(){Y(e,n),i()},r=function(){i()},i=function(){removeEventListener("pointerup",t,W),removeEventListener("pointercancel",r,W)};addEventListener("pointerup",t,W),addEventListener("pointercancel",r,W)}(n,e):Y(n,e)}},ee=function(e){["mousedown","keydown","touchstart","pointerdown"].forEach((function(n){return e(n,$,W)}))},ne=[100,300],te=function(e,n){n=n||{},S((function(){var t,r=L(),a=l("FID"),u=function(e){e.startTime0&&e.responseStart=0?r=\"back-forward-cache\":t&&(document.prerendering||u()>0?r=\"prerender\":document.wasDiscarded?r=\"restore\":t.type&&(r=t.type.replace(/_/g,\"-\")));return{name:e,value:void 0===n?-1:n,rating:\"good\",delta:0,entries:[],id:\"v4-\".concat(Date.now(),\"-\").concat(Math.floor(8999999999999*Math.random())+1e12),navigationType:r}},s=function(e,n,t){try{if(PerformanceObserver.supportedEntryTypes.includes(e)){var r=new PerformanceObserver((function(e){Promise.resolve().then((function(){n(e.getEntries())}))}));return r.observe(Object.assign({type:e,buffered:!0},t||{})),r}}catch(e){}},d=function(e,n,t,r){var i,o;return function(a){n.value>=0&&(a||r)&&((o=n.value-(i||0))||void 0===i)&&(i=n.value,n.delta=o,n.rating=function(e,n){return e>n[1]?\"poor\":e>n[0]?\"needs-improvement\":\"good\"}(n.value,t),e(n))}},l=function(e){requestAnimationFrame((function(){return requestAnimationFrame((function(){return e()}))}))},p=function(e){document.addEventListener(\"visibilitychange\",(function(){\"hidden\"===document.visibilityState&&e()}))},v=function(e){var n=!1;return function(){n||(e(),n=!0)}},m=-1,h=function(){return\"hidden\"!==document.visibilityState||document.prerendering?1/0:0},g=function(e){\"hidden\"===document.visibilityState&&m>-1&&(m=\"visibilitychange\"===e.type?e.timeStamp:0,T())},y=function(){addEventListener(\"visibilitychange\",g,!0),addEventListener(\"prerenderingchange\",g,!0)},T=function(){removeEventListener(\"visibilitychange\",g,!0),removeEventListener(\"prerenderingchange\",g,!0)},E=function(){return m<0&&(m=h(),y(),a((function(){setTimeout((function(){m=h(),y()}),0)}))),{get firstHiddenTime(){return m}}},C=function(e){document.prerendering?addEventListener(\"prerenderingchange\",(function(){return e()}),!0):e()},b=[1800,3e3],S=function(e,n){n=n||{},C((function(){var t,r=E(),i=f(\"FCP\"),o=s(\"paint\",(function(e){e.forEach((function(e){\"first-contentful-paint\"===e.name&&(o.disconnect(),e.startTimer.value&&(r.value=i,r.entries=o,t())},u=s(\"layout-shift\",c);u&&(t=d(e,r,L,n.reportAllChanges),p((function(){c(u.takeRecords()),t(!0)})),a((function(){i=0,r=f(\"CLS\",0),t=d(e,r,L,n.reportAllChanges),l((function(){return t()}))})),setTimeout(t,0))})))},A=0,I=1/0,P=0,M=function(e){e.forEach((function(e){e.interactionId&&(I=Math.min(I,e.interactionId),P=Math.max(P,e.interactionId),A=P?(P-I)/7+1:0)}))},k=function(){return e?A:performance.interactionCount||0},F=function(){\"interactionCount\"in performance||e||(e=s(\"event\",M,{type:\"event\",buffered:!0,durationThreshold:0}))},D=[],x=new Map,R=0,B=function(){var e=Math.min(D.length-1,Math.floor((k()-R)/50));return D[e]},H=[],q=function(e){if(H.forEach((function(n){return n(e)})),e.interactionId||\"first-input\"===e.entryType){var n=D[D.length-1],t=x.get(e.interactionId);if(t||D.length<10||e.duration>n.latency){if(t)e.duration>t.latency?(t.entries=[e],t.latency=e.duration):e.duration===t.latency&&e.startTime===t.entries[0].startTime&&t.entries.push(e);else{var r={id:e.interactionId,latency:e.duration,entries:[e]};x.set(r.id,r),D.push(r)}D.sort((function(e,n){return n.latency-e.latency})),D.length>10&&D.splice(10).forEach((function(e){return x.delete(e.id)}))}}},O=function(e){var n=self.requestIdleCallback||self.setTimeout,t=-1;return e=v(e),\"hidden\"===document.visibilityState?e():(t=n(e),p(e)),t},N=[200,500],j=function(e,n){\"PerformanceEventTiming\"in self&&\"interactionId\"in PerformanceEventTiming.prototype&&(n=n||{},C((function(){var t;F();var r,i=f(\"INP\"),o=function(e){O((function(){e.forEach(q);var n=B();n&&n.latency!==i.value&&(i.value=n.latency,i.entries=n.entries,r())}))},c=s(\"event\",o,{durationThreshold:null!==(t=n.durationThreshold)&&void 0!==t?t:40});r=d(e,i,N,n.reportAllChanges),c&&(c.observe({type:\"first-input\",buffered:!0}),p((function(){o(c.takeRecords()),r(!0)})),a((function(){R=k(),D.length=0,x.clear(),i=f(\"INP\"),r=d(e,i,N,n.reportAllChanges)})))})))},_=[2500,4e3],z={},G=function(e,n){n=n||{},C((function(){var t,r=E(),i=f(\"LCP\"),o=function(e){n.reportAllChanges||(e=e.slice(-1)),e.forEach((function(e){e.startTime=0&&t1e12?new Date:performance.now())-e.timeStamp;\"pointerdown\"==e.type?function(e,n){var t=function(){W(e,n),i()},r=function(){i()},i=function(){removeEventListener(\"pointerup\",t,U),removeEventListener(\"pointercancel\",r,U)};addEventListener(\"pointerup\",t,U),addEventListener(\"pointercancel\",r,U)}(n,e):W(n,e)}},Z=function(e){[\"mousedown\",\"keydown\",\"touchstart\",\"pointerdown\"].forEach((function(n){return e(n,Y,U)}))},$=[100,300],ee=function(e,r){r=r||{},C((function(){var o,c=E(),u=f(\"FID\"),l=function(e){e.startTime{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&i.decode();let o=null;function a(){return null!==o&&o.buffer===_.memory.buffer||(o=new Uint8Array(_.memory.buffer)),o}function s(_,t){return _>>>=0,i.decode(a().slice(_,_+t))}function c(_){r===t.length&&t.push(t.length+1);const e=r;return r=t[e],t[e]=_,e}let g=0;const w="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},d=function(_,t){const e=w.encode(_);return t.set(e),{read:_.length,written:e.length}};function b(_,t,e){if(void 0===e){const e=w.encode(_),r=t(e.length,1)>>>0;return a().subarray(r,r+e.length).set(e),g=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=a();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=a().subarray(n+o,n+r);o+=d(_,t).written,n=e(n,r,o,1)>>>0}return g=o,n}function l(_){return null==_}let u=null;function f(){return null!==u&&u.buffer===_.memory.buffer||(u=new Int32Array(_.memory.buffer)),u}function p(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=p(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>{_.__wbindgen_export_3.get(t.dtor)(t.a,t.b)}));function m(t,e,r,n){const i={a:t,b:e,cnt:1,dtor:r},o=(...t)=>{i.cnt++;const e=i.a;i.a=0;try{return n(e,i.b,...t)}finally{0==--i.cnt?(_.__wbindgen_export_3.get(i.dtor)(e,i.b),y.unregister(i)):i.a=e}};return o.original=i,y.register(o,i,i),o}function h(t,e,r){_._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(t,e,c(r))}function v(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function k(_,t){const e=t(1*_.length,1)>>>0;return a().set(_,e/1),g=_.length,e}let P=null;function S(){return null!==P&&P.buffer===_.memory.buffer||(P=new BigInt64Array(_.memory.buffer)),P}function V(_,t){return _>>>=0,a().subarray(_/1,_/1+t)}function x(t,e){try{return t.apply(this,e)}catch(t){_.__wbindgen_exn_store(c(t))}}const F="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_address_free(t>>>0)));class T{static __wrap(_){_>>>=0;const t=Object.create(T.prototype);return t.__wbg_ptr=_,F.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,F.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_address_free(t)}static from_private_key(t){v(t,W);const e=_.address_from_private_key(t.__wbg_ptr);return T.__wrap(e)}static from_view_key(t){v(t,a_);const e=_.address_from_view_key(t.__wbg_ptr);return T.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.address_from_string(e,r);return T.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.address_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}verify(t,e){const r=k(t,_.__wbindgen_malloc),n=g;v(e,t_);return 0!==_.address_verify(this.__wbg_ptr,r,n,e.__wbg_ptr)}}const R="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_execution_free(t>>>0)));class z{static __wrap(_){_>>>=0;const t=Object.create(z.prototype);return t.__wbg_ptr=_,R.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,R.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_execution_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.execution_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.execution_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const A="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_executionresponse_free(t>>>0)));class O{static __wrap(_){_>>>=0;const t=Object.create(O.prototype);return t.__wbg_ptr=_,A.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,A.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_executionresponse_free(t)}getOutputs(){return n(_.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const t=_.executionresponse_getExecution(this.__wbg_ptr);return 0===t?void 0:z.__wrap(t)}getKeys(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getKeys(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return E.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const t=_.executionresponse_getProvingKey(this.__wbg_ptr);return 0===t?void 0:Q.__wrap(t)}getVerifyingKey(){const t=_.executionresponse_getVerifyingKey(this.__wbg_ptr);return i_.__wrap(t)}getFunctionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}getProgram(){const t=_.executionresponse_getProgram(this.__wbg_ptr);return J.__wrap(t)}}const j="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_field_free(t>>>0)));class K{static __wrap(_){_>>>=0;const t=Object.create(K.prototype);return t.__wbg_ptr=_,j.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,j.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_field_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.field_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.field_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return K.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const M="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_keypair_free(t>>>0)));class E{static __wrap(_){_>>>=0;const t=Object.create(E.prototype);return t.__wbg_ptr=_,M.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,M.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_keypair_free(t)}constructor(t,e){v(t,Q);var r=t.__destroy_into_raw();v(e,i_);var n=e.__destroy_into_raw();const i=_.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_provingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return Q.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_verifyingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return i_.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_metadata_free(t>>>0)));class I{static __wrap(_){_>>>=0;const t=Object.create(I.prototype);return t.__wbg_ptr=_,B.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_metadata_free(t)}get name(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_name(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set name(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_name(this.__wbg_ptr,e,r)}get locator(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set locator(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_locator(this.__wbg_ptr,e,r)}get prover(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set prover(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_prover(this.__wbg_ptr,e,r)}get verifier(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifier(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifier(this.__wbg_ptr,e,r)}get verifyingKey(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifyingKey(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,e,r)}static baseUrl(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.metadata_baseUrl(i);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static bond_public(){const t=_.metadata_bond_public();return I.__wrap(t)}static bond_validator(){const t=_.metadata_bond_validator();return I.__wrap(t)}static claim_unbond_public(){const t=_.metadata_claim_unbond_public();return I.__wrap(t)}static fee_private(){const t=_.metadata_fee_private();return I.__wrap(t)}static fee_public(){const t=_.metadata_fee_public();return I.__wrap(t)}static inclusion(){const t=_.metadata_inclusion();return I.__wrap(t)}static join(){const t=_.metadata_join();return I.__wrap(t)}static set_validator_state(){const t=_.metadata_set_validator_state();return I.__wrap(t)}static split(){const t=_.metadata_split();return I.__wrap(t)}static transfer_private(){const t=_.metadata_transfer_private();return I.__wrap(t)}static transfer_private_to_public(){const t=_.metadata_transfer_private_to_public();return I.__wrap(t)}static transfer_public(){const t=_.metadata_transfer_public();return I.__wrap(t)}static transfer_public_as_signer(){const t=_.metadata_transfer_public_as_signer();return I.__wrap(t)}static transfer_public_to_private(){const t=_.metadata_transfer_public_to_private();return I.__wrap(t)}static unbond_public(){const t=_.metadata_unbond_public();return I.__wrap(t)}}const U="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_offlinequery_free(t>>>0)));class C{static __wrap(_){_>>>=0;const t=Object.create(C.prototype);return t.__wbg_ptr=_,U.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,U.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_offlinequery_free(t)}constructor(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_new(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return this.__wbg_ptr=e>>>0,this}finally{_.__wbindgen_add_to_stack_pointer(16)}}addStatePath(t,e){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g,s=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),c=g;_.offlinequery_addStatePath(i,this.__wbg_ptr,o,a,s,c);var r=f()[i/4+0];if(f()[i/4+1])throw n(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.offlinequery_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return C.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekey_free(t>>>0)));class W{static __wrap(_){_>>>=0;const t=Object.create(W.prototype);return t.__wbg_ptr=_,q.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,q.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekey_free(t)}constructor(){const t=_.privatekey_new();return this.__wbg_ptr=t>>>0,this}static from_seed_unchecked(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_from_seed_unchecked(e,r);return W.__wrap(n)}static from_string(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_from_string(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_view_key(){const t=_.privatekey_to_view_key(this.__wbg_ptr);return a_.__wrap(t)}to_address(){const t=_.privatekey_to_address(this.__wbg_ptr);return T.__wrap(t)}sign(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_sign(this.__wbg_ptr,e,r);return t_.__wrap(n)}static newEncrypted(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_newEncrypted(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_toCiphertext(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,$);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_fromPrivateKeyCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return W.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekeyciphertext_free(t>>>0)));class ${static __wrap(_){_>>>=0;const t=Object.create($.prototype);return t.__wbg_ptr=_,N.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,N.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekeyciphertext_free(t)}static encryptPrivateKey(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_toCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return $.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_decryptToPrivateKey(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_program_free(t>>>0)));class J{static __wrap(_){_>>>=0;const t=Object.create(J.prototype);return t.__wbg_ptr=_,D.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_program_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return J.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}hasFunction(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;return 0!==_.program_hasFunction(this.__wbg_ptr,e,r)}getFunctions(){return n(_.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getFunctionInputs(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_getMappings(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return n(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getRecordMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getStructMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=_.program_getCreditsProgram();return J.__wrap(t)}id(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_id(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}address(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_address(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return T.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){v(t,J);return 0!==_.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return n(_.program_getImports(this.__wbg_ptr))}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_programmanager_free(t>>>0)));const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_provingkey_free(t>>>0)));class Q{static __wrap(_){_>>>=0;const t=Object.create(Q.prototype);return t.__wbg_ptr=_,L.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_provingkey_free(t)}isBondPublicProver(){return 0!==_.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==_.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==_.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==_.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==_.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==_.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==_.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==_.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==_.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==_.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==_.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==_.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==_.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==_.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==_.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.provingkey_copy(this.__wbg_ptr);return Q.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.provingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.provingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const X="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordciphertext_free(t>>>0)));class G{static __wrap(_){_>>>=0;const t=Object.create(G.prototype);return t.__wbg_ptr=_,X.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,X.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordciphertext_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return G.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}decrypt(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16);v(t,a_),_.recordciphertext_decrypt(i,this.__wbg_ptr,t.__wbg_ptr);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isOwner(t){v(t,a_);return 0!==_.recordciphertext_isOwner(this.__wbg_ptr,t.__wbg_ptr)}}const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordplaintext_free(t>>>0)));class Z{static __wrap(_){_>>>=0;const t=Object.create(Z.prototype);return t.__wbg_ptr=_,Y.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordplaintext_free(t)}commitment(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.recordplaintext_commitment(o,this.__wbg_ptr,a,s,c,w);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return K.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordplaintext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}microcredits(){const t=_.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,t)}nonce(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_nonce(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}serialNumberString(t,e,r){let i,o;try{const p=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const y=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;_.recordplaintext_serialNumberString(p,this.__wbg_ptr,t.__wbg_ptr,y,m,h,k);var a=f()[p/4+0],c=f()[p/4+1],w=f()[p/4+2],d=f()[p/4+3],l=a,u=c;if(d)throw l=0,u=0,n(w);return i=l,o=u,s(l,u)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(i,o,1)}}}const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_signature_free(t>>>0)));class t_{static __wrap(_){_>>>=0;const t=Object.create(t_.prototype);return t.__wbg_ptr=_,__.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_signature_free(t)}static sign(t,e){v(t,W);const r=k(e,_.__wbindgen_malloc),n=g,i=_.privatekey_sign(t.__wbg_ptr,r,n);return t_.__wrap(i)}verify(t,e){v(t,T);const r=k(e,_.__wbindgen_malloc),n=g;return 0!==_.signature_verify(this.__wbg_ptr,t.__wbg_ptr,r,n)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.signature_from_string(e,r);return t_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.signature_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_transaction_free(t>>>0)));class r_{static __wrap(_){_>>>=0;const t=Object.create(r_.prototype);return t.__wbg_ptr=_,e_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_transaction_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.transaction_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return r_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionType(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionType(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_verifyingkey_free(t>>>0)));class i_{static __wrap(_){_>>>=0;const t=Object.create(i_.prototype);return t.__wbg_ptr=_,n_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_verifyingkey_free(t)}static bondPublicVerifier(){const t=_.verifyingkey_bondPublicVerifier();return i_.__wrap(t)}static bondValidatorVerifier(){const t=_.verifyingkey_bondValidatorVerifier();return i_.__wrap(t)}static claimUnbondPublicVerifier(){const t=_.verifyingkey_claimUnbondPublicVerifier();return i_.__wrap(t)}static feePrivateVerifier(){const t=_.verifyingkey_feePrivateVerifier();return i_.__wrap(t)}static feePublicVerifier(){const t=_.verifyingkey_feePublicVerifier();return i_.__wrap(t)}static inclusionVerifier(){const t=_.verifyingkey_inclusionVerifier();return i_.__wrap(t)}static joinVerifier(){const t=_.verifyingkey_joinVerifier();return i_.__wrap(t)}static setValidatorStateVerifier(){const t=_.verifyingkey_setValidatorStateVerifier();return i_.__wrap(t)}static splitVerifier(){const t=_.verifyingkey_splitVerifier();return i_.__wrap(t)}static transferPrivateVerifier(){const t=_.verifyingkey_transferPrivateVerifier();return i_.__wrap(t)}static transferPrivateToPublicVerifier(){const t=_.verifyingkey_transferPrivateToPublicVerifier();return i_.__wrap(t)}static transferPublicVerifier(){const t=_.verifyingkey_transferPublicVerifier();return i_.__wrap(t)}static transferPublicAsSignerVerifier(){const t=_.verifyingkey_transferPublicAsSignerVerifier();return i_.__wrap(t)}static transferPublicToPrivateVerifier(){const t=_.verifyingkey_transferPublicToPrivateVerifier();return i_.__wrap(t)}static unbondPublicVerifier(){const t=_.verifyingkey_unbondPublicVerifier();return i_.__wrap(t)}isBondPublicVerifier(){return 0!==_.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==_.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==_.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==_.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==_.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==_.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==_.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==_.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==_.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==_.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==_.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==_.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==_.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==_.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==_.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.verifyingkey_copy(this.__wbg_ptr);return i_.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.verifyingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.verifyingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_viewkey_free(t>>>0)));class a_{static __wrap(_){_>>>=0;const t=Object.create(a_.prototype);return t.__wbg_ptr=_,o_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_viewkey_free(t)}static from_private_key(t){v(t,W);const e=_.privatekey_to_view_key(t.__wbg_ptr);return a_.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.viewkey_from_string(e,r);return a_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.viewkey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_address(){const t=_.address_from_view_key(this.__wbg_ptr);return T.__wrap(t)}decrypt(t){let e,r;try{const l=_.__wbindgen_add_to_stack_pointer(-16),u=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),p=g;_.viewkey_decrypt(l,this.__wbg_ptr,u,p);var i=f()[l/4+0],o=f()[l/4+1],a=f()[l/4+2],c=f()[l/4+3],w=i,d=o;if(c)throw w=0,d=0,n(a);return e=w,r=d,s(w,d)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(e,r,1)}}}function s_(){const t={wbg:{}};return t.wbg.__wbindgen_object_drop_ref=function(_){n(_)},t.wbg.__wbg_new_71801a555ad9f2aa=function(){return x((function(){return c(new XMLHttpRequest)}),arguments)},t.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return x((function(_,t,r){e(_).overrideMimeType(s(t,r))}),arguments)},t.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return x((function(_,t,r,n,i,o){e(_).open(s(t,r),s(n,i),0!==o)}),arguments)},t.wbg.__wbg_send_80d29985093c1ec5=function(){return x((function(_){e(_).send()}),arguments)},t.wbg.__wbg_response_7c2e2759084f7279=function(){return x((function(_){return c(e(_).response)}),arguments)},t.wbg.__wbg_status_d485fb5a478426fb=function(){return x((function(_){return e(_).status}),arguments)},t.wbg.__wbg_new_72fb9a18b5ae2624=function(){return c(new Object)},t.wbg.__wbindgen_string_new=function(_,t){return c(s(_,t))},t.wbg.__wbg_set_1f9b04f170055d33=function(){return x((function(_,t,r){return Reflect.set(e(_),e(t),e(r))}),arguments)},t.wbg.__wbg_new_ab6fd82b10560829=function(){return x((function(){return c(new Headers)}),arguments)},t.wbg.__wbindgen_object_clone_ref=function(_){return c(e(_))},t.wbg.__wbg_new_0d76b0581eca6298=function(){return x((function(){return c(new AbortController)}),arguments)},t.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return c(e(_).signal)},t.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return x((function(_,t,r,n,i){e(_).append(s(t,r),s(n,i))}),arguments)},t.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=e(_)instanceof Response}catch(_){t=!1}return t},t.wbg.__wbg_status_61a01141acd3cf74=function(_){return e(_).status},t.wbg.__wbg_url_5f6dc4009ac5f99d=function(t,r){const n=b(e(r).url,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_headers_9620bfada380764a=function(_){return c(e(_).headers)},t.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return c(Symbol.iterator)},t.wbg.__wbg_get_e3c254076557e348=function(){return x((function(_,t){return c(Reflect.get(e(_),e(t)))}),arguments)},t.wbg.__wbindgen_is_function=function(_){return"function"==typeof e(_)},t.wbg.__wbg_call_27c0f87801dedf93=function(){return x((function(_,t){return c(e(_).call(e(t)))}),arguments)},t.wbg.__wbindgen_is_object=function(_){const t=e(_);return"object"==typeof t&&null!==t},t.wbg.__wbg_next_40fc327bfc8770e6=function(_){return c(e(_).next)},t.wbg.__wbg_next_196c84450b364254=function(){return x((function(_){return c(e(_).next())}),arguments)},t.wbg.__wbg_done_298b57d23c0fc80c=function(_){return e(_).done},t.wbg.__wbg_value_d93c65011f51a456=function(_){return c(e(_).value)},t.wbg.__wbg_abort_2aa7521d5690750e=function(_){e(_).abort()},t.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return x((function(_){return c(JSON.stringify(e(_)))}),arguments)},t.wbg.__wbindgen_string_get=function(t,r){const n=e(r),i="string"==typeof n?n:void 0;var o=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;f()[t/4+1]=a,f()[t/4+0]=o},t.wbg.__wbg_executionresponse_new=function(_){return c(O.__wrap(_))},t.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return x((function(_,t,r){return c(e(_).call(e(t),e(r)))}),arguments)},t.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(s(_,t))},t.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return c(new Array(_>>>0))},t.wbg.__wbg_set_d4638f722068f043=function(_,t,r){e(_)[t>>>0]=n(r)},t.wbg.__wbg_transaction_new=function(_){return c(r_.__wrap(_))},t.wbg.__wbindgen_bigint_from_u64=function(_){return c(BigInt.asUintN(64,_))},t.wbg.__wbg_keypair_new=function(_){return c(E.__wrap(_))},t.wbg.__wbindgen_module=function(){return c(w_.__wbindgen_wasm_module)},t.wbg.__wbindgen_memory=function(){return c(_.memory)},t.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,r,n){return c(function(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}(e(_),e(t),e(r),n>>>0))},t.wbg.__wbindgen_cb_drop=function(_){const t=n(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},t.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return c(new Array)},t.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return e(_).push(e(t))},t.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return x((function(_){return c(e(_).arrayBuffer())}),arguments)},t.wbg.__wbg_new_63b92bc8671ed464=function(_){return c(new Uint8Array(e(_)))},t.wbg.__wbg_length_c20a40f15020d68a=function(_){return e(_).length},t.wbg.__wbg_new_81740750da40724f=function(t,e){try{var r={a:t,b:e};const n=new Promise(((t,e)=>{const n=r.a;r.a=0;try{return function(t,e,r,n){_.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(t,e,c(r),c(n))}(n,r.b,t,e)}finally{r.a=n}}));return c(n)}finally{r.a=r.b=0}},t.wbg.__wbindgen_number_new=function(_){return c(_)},t.wbg.__wbg_new_abda76e883ba8a5f=function(){return c(new Error)},t.wbg.__wbg_stack_658279fe44541cf6=function(t,r){const n=b(e(r).stack,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_error_f851667af71bcfc6=function(t,e){let r,n;try{r=t,n=e,console.error(s(t,e))}finally{_.__wbindgen_free(r,n,1)}},t.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return c(e(_).buffer)},t.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,r){return c(new Uint8Array(e(_),t>>>0,r>>>0))},t.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return x((function(_,t){e(_).randomFillSync(n(t))}),arguments)},t.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,r){return c(e(_).subarray(t>>>0,r>>>0))},t.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return x((function(_,t){e(_).getRandomValues(e(t))}),arguments)},t.wbg.__wbg_set_a47bac70306a19a7=function(_,t,r){e(_).set(e(t),r>>>0)},t.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return c(e(_).crypto)},t.wbg.__wbg_process_4a72847cc503995b=function(_){return c(e(_).process)},t.wbg.__wbg_versions_f686565e586dd935=function(_){return c(e(_).versions)},t.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return c(e(_).node)},t.wbg.__wbindgen_is_string=function(_){return"string"==typeof e(_)},t.wbg.__wbg_require_cca90b1a94a0255b=function(){return x((function(){return c(module.require)}),arguments)},t.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return c(e(_).msCrypto)},t.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return c(new Uint8Array(_>>>0))},t.wbg.__wbg_length_cd7af8117672b8b8=function(_){return e(_).length},t.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return c(e(_)[t>>>0])},t.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return x((function(){return c(self.self)}),arguments)},t.wbg.__wbg_window_c6fb939a7f436783=function(){return x((function(){return c(window.window)}),arguments)},t.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return x((function(){return c(globalThis.globalThis)}),arguments)},t.wbg.__wbg_global_207b558942527489=function(){return x((function(){return c(global.global)}),arguments)},t.wbg.__wbindgen_is_undefined=function(_){return void 0===e(_)},t.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return c(new Function(s(_,t)))},t.wbg.__wbg_has_0af94d20077affa2=function(){return x((function(_,t){return Reflect.has(e(_),e(t))}),arguments)},t.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return c(fetch(e(_)))},t.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return c(e(_).fetch(e(t)))},t.wbg.__wbindgen_debug_string=function(t,r){const n=b(p(e(r)),_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbindgen_throw=function(_,t){throw new Error(s(_,t))},t.wbg.__wbindgen_rethrow=function(_){throw n(_)},t.wbg.__wbg_then_a73caa9a87991566=function(_,t,r){return c(e(_).then(e(t),e(r)))},t.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return c(e(_).then(e(t)))},t.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(e(_))},t.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return c(e(_).queueMicrotask)},t.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return c(Promise.resolve(e(_)))},t.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return c(Atomics.waitAsync)},t.wbg.__wbg_new_8cccba86b0f574cb=function(_){return c(new Int32Array(e(_)))},t.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,r){return c(Atomics.waitAsync(e(_),t,r))},t.wbg.__wbg_async_19c0400d97cc72fe=function(_){return e(_).async},t.wbg.__wbg_value_571d60108110e917=function(_){return c(e(_).value)},t.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(t){const e=b("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;f()[t/4+1]=r,f()[t/4+0]=e},t.wbg.__wbg_new_d1187ae36d662ef9=function(){return x((function(_,t){return c(new Worker(s(_,t)))}),arguments)},t.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){e(_).onmessage=e(t)},t.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,r){return c(Array.of(e(_),e(t),e(r)))},t.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return x((function(_,t){e(_).postMessage(e(t))}),arguments)},t.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return c(e(_).data)},t.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return x((function(_,t,r){return c(new Request(s(_,t),e(r)))}),arguments)},t.wbg.__wbg_responseText_c67ed2d48db10769=function(){return x((function(t,r){const n=e(r).responseText;var i=l(n)?0:b(n,_.__wbindgen_malloc,_.__wbindgen_realloc),o=g;f()[t/4+1]=o,f()[t/4+0]=i}),arguments)},t.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return c(m(_,t,538,h))},t.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return c(m(_,t,538,h))},t}function c_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function g_(t,e){return _=t.exports,w_.__wbindgen_wasm_module=e,P=null,u=null,o=null,_.__wbindgen_start(),_}async function w_(t,e){if(void 0!==_)return _;const r=s_();("string"==typeof t||"function"==typeof Request&&t instanceof Request||"function"==typeof URL&&t instanceof URL)&&(t=fetch(t)),c_(r,e);const{instance:n,module:i}=await async function(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}(await t,r);return g_(n,i)}var d_=Object.freeze({__proto__:null,Address:T,Execution:z,ExecutionResponse:O,Field:K,KeyPair:E,Metadata:I,OfflineQuery:C,PrivateKey:W,PrivateKeyCiphertext:$,Program:J,ProgramManager:class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_programmanager_free(t)}static buildDeploymentTransaction(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g;let p=0;l(i)||(v(i,Z),p=i.__destroy_into_raw());var y=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g;let h=0;l(s)||(v(s,Q),h=s.__destroy_into_raw());let k=0;l(w)||(v(w,i_),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,C),P=d.__destroy_into_raw());return n(_.programmanager_buildDeploymentTransaction(t.__wbg_ptr,u,f,r,p,y,m,l(a)?0:c(a),h,k,P))}static estimateDeploymentFee(t,e){const r=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;return n(_.programmanager_estimateDeploymentFee(r,i,l(e)?0:c(e)))}static estimateProgramNameCost(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.programmanager_estimateProgramNameCost(i,o,a);var e=S()[i/8+0],r=f()[i/4+2];if(f()[i/4+3])throw n(r);return BigInt.asUintN(64,e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(t,e,r,i,o,a,s,w,d,u,f){v(t,W);const p=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g,m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(w)||(v(w,Q),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,i_),P=d.__destroy_into_raw());var S=l(u)?0:b(u,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(f)||(v(f,C),x=f.__destroy_into_raw());return n(_.programmanager_executeFunctionOffline(t.__wbg_ptr,p,y,m,h,c(i),o,a,l(s)?0:c(s),k,P,S,V,x))}static buildExecutionTransaction(t,e,r,i,o,a,s,w,d,u,f,p,y){v(t,W);const m=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;let S=0;l(a)||(v(a,Z),S=a.__destroy_into_raw());var V=l(s)?0:b(s,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(d)||(v(d,Q),F=d.__destroy_into_raw());let T=0;l(u)||(v(u,i_),T=u.__destroy_into_raw());let R=0;l(f)||(v(f,Q),R=f.__destroy_into_raw());let z=0;l(p)||(v(p,i_),z=p.__destroy_into_raw());let A=0;l(y)||(v(y,C),A=y.__destroy_into_raw());return n(_.programmanager_buildExecutionTransaction(t.__wbg_ptr,m,h,k,P,c(i),o,S,V,x,l(w)?0:c(w),F,T,R,z,A))}static estimateExecutionFee(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g,p=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g;var m=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(w)||(v(w,i_),P=w.__destroy_into_raw());let S=0;l(d)||(v(d,C),S=d.__destroy_into_raw());return n(_.programmanager_estimateExecutionFee(t.__wbg_ptr,u,f,p,y,c(i),m,h,l(a)?0:c(a),k,P,S))}static estimateFinalizeFee(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.programmanager_estimateFinalizeFee(o,a,s,c,w);var r=S()[o/8+0],i=f()[o/4+2];if(f()[o/4+3])throw n(i);return BigInt.asUintN(64,r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(t,e,r,i,o,a,s,c,w,d,u){v(t,W),v(e,Z);var f=e.__destroy_into_raw();v(r,Z);var p=r.__destroy_into_raw();let y=0;l(o)||(v(o,Z),y=o.__destroy_into_raw());var m=l(a)?0:b(a,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(c)||(v(c,i_),P=c.__destroy_into_raw());let S=0;l(w)||(v(w,Q),S=w.__destroy_into_raw());let V=0;l(d)||(v(d,i_),V=d.__destroy_into_raw());let x=0;l(u)||(v(u,C),x=u.__destroy_into_raw());return n(_.programmanager_buildJoinTransaction(t.__wbg_ptr,f,p,i,y,m,h,k,P,S,V,x))}static buildSplitTransaction(t,e,r,i,o,a,s){v(t,W),v(r,Z);var c=r.__destroy_into_raw(),w=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;let u=0;l(o)||(v(o,Q),u=o.__destroy_into_raw());let f=0;l(a)||(v(a,i_),f=a.__destroy_into_raw());let p=0;l(s)||(v(s,C),p=s.__destroy_into_raw());return n(_.programmanager_buildSplitTransaction(t.__wbg_ptr,e,c,w,d,u,f,p))}static buildTransferTransaction(t,e,r,i,o,a,s,c,w,d,u,f,p){v(t,W);const y=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;let P=0;l(o)||(v(o,Z),P=o.__destroy_into_raw());let S=0;l(s)||(v(s,Z),S=s.__destroy_into_raw());var V=l(c)?0:b(c,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(w)||(v(w,Q),F=w.__destroy_into_raw());let T=0;l(d)||(v(d,i_),T=d.__destroy_into_raw());let R=0;l(u)||(v(u,Q),R=u.__destroy_into_raw());let z=0;l(f)||(v(f,i_),z=f.__destroy_into_raw());let A=0;l(p)||(v(p,C),A=p.__destroy_into_raw());return n(_.programmanager_buildTransferTransaction(t.__wbg_ptr,e,y,m,h,k,P,a,S,V,x,F,T,R,z,A))}static synthesizeKeyPair(t,e,r,i,o){v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,w=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;return n(_.programmanager_synthesizeKeyPair(t.__wbg_ptr,a,s,w,d,c(i),l(o)?0:c(o)))}},ProvingKey:Q,RecordCiphertext:G,RecordPlaintext:Z,Signature:t_,Transaction:r_,VerifyingKey:i_,ViewKey:a_,default:w_,initSync:function(t,e){if(void 0!==_)return _;const r=s_();return c_(r,e),t instanceof WebAssembly.Module||(t=new WebAssembly.Module(t)),g_(new WebAssembly.Instance(t,r),t)},initThreadPool:function(t,e){return n(_.initThreadPool(c(t),e))},runRayonThread:function(t){_.runRayonThread(t)},verifyFunctionExecution:function(t,e,r,i){try{const s=_.__wbindgen_add_to_stack_pointer(-16);v(t,z),v(e,i_),v(r,J);const c=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.verifyFunctionExecution(s,t.__wbg_ptr,e.__wbg_ptr,r.__wbg_ptr,c,w);var o=f()[s/4+0],a=f()[s/4+1];if(f()[s/4+2])throw n(a);return 0!==o}finally{_.__wbindgen_add_to_stack_pointer(16)}}});await async function(_){const[t,{module:e,memory:r,address:n}]=await Promise.all([_,new Promise((_=>{addEventListener("message",(t=>{_(t.data)}),{capture:!0,once:!0})}))]),i=await t({initializeHook:(_,t)=>_(e,r)});postMessage(null),i.runRayonThread(n),close()}((async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n="assets/aleo_wasm.wasm";return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(w_,n):await w_(n),d_})); \ No newline at end of file +let _;const t=new Array(128).fill(void 0);function e(_){return t[_]}t.push(void 0,null,!0,!1);let r=t.length;function n(_){const n=e(_);return function(_){_<132||(t[_]=r,r=_)}(_),n}const i="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&i.decode();let o=null;function a(){return null!==o&&o.buffer===_.memory.buffer||(o=new Uint8Array(_.memory.buffer)),o}function s(_,t){return _>>>=0,i.decode(a().slice(_,_+t))}function c(_){r===t.length&&t.push(t.length+1);const e=r;return r=t[e],t[e]=_,e}let g=0;const w="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},d=function(_,t){const e=w.encode(_);return t.set(e),{read:_.length,written:e.length}};function b(_,t,e){if(void 0===e){const e=w.encode(_),r=t(e.length,1)>>>0;return a().subarray(r,r+e.length).set(e),g=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=a();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=a().subarray(n+o,n+r);o+=d(_,t).written,n=e(n,r,o,1)>>>0}return g=o,n}function l(_){return null==_}let u=null;function f(){return null!==u&&u.buffer===_.memory.buffer||(u=new Int32Array(_.memory.buffer)),u}function p(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=p(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>{_.__wbindgen_export_3.get(t.dtor)(t.a,t.b)}));function m(t,e,r,n){const i={a:t,b:e,cnt:1,dtor:r},o=(...t)=>{i.cnt++;const e=i.a;i.a=0;try{return n(e,i.b,...t)}finally{0==--i.cnt?(_.__wbindgen_export_3.get(i.dtor)(e,i.b),y.unregister(i)):i.a=e}};return o.original=i,y.register(o,i,i),o}function h(t,e,r){_._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(t,e,c(r))}function v(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function k(_,t){const e=t(1*_.length,1)>>>0;return a().set(_,e/1),g=_.length,e}let P=null;function S(){return null!==P&&P.buffer===_.memory.buffer||(P=new BigInt64Array(_.memory.buffer)),P}function V(_,t){return _>>>=0,a().subarray(_/1,_/1+t)}function x(t,e){try{return t.apply(this,e)}catch(t){_.__wbindgen_exn_store(c(t))}}const F="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_address_free(t>>>0)));class T{static __wrap(_){_>>>=0;const t=Object.create(T.prototype);return t.__wbg_ptr=_,F.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,F.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_address_free(t)}static from_private_key(t){v(t,W);const e=_.address_from_private_key(t.__wbg_ptr);return T.__wrap(e)}static from_view_key(t){v(t,a_);const e=_.address_from_view_key(t.__wbg_ptr);return T.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.address_from_string(e,r);return T.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.address_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}verify(t,e){const r=k(t,_.__wbindgen_malloc),n=g;v(e,t_);return 0!==_.address_verify(this.__wbg_ptr,r,n,e.__wbg_ptr)}}const R="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_execution_free(t>>>0)));class z{static __wrap(_){_>>>=0;const t=Object.create(z.prototype);return t.__wbg_ptr=_,R.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,R.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_execution_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.execution_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.execution_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const A="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_executionresponse_free(t>>>0)));class O{static __wrap(_){_>>>=0;const t=Object.create(O.prototype);return t.__wbg_ptr=_,A.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,A.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_executionresponse_free(t)}getOutputs(){return n(_.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const t=_.executionresponse_getExecution(this.__wbg_ptr);return 0===t?void 0:z.__wrap(t)}getKeys(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getKeys(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return E.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const t=_.executionresponse_getProvingKey(this.__wbg_ptr);return 0===t?void 0:Q.__wrap(t)}getVerifyingKey(){const t=_.executionresponse_getVerifyingKey(this.__wbg_ptr);return i_.__wrap(t)}getFunctionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}getProgram(){const t=_.executionresponse_getProgram(this.__wbg_ptr);return J.__wrap(t)}}const j="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_field_free(t>>>0)));class K{static __wrap(_){_>>>=0;const t=Object.create(K.prototype);return t.__wbg_ptr=_,j.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,j.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_field_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.field_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.field_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return K.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const M="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_keypair_free(t>>>0)));class E{static __wrap(_){_>>>=0;const t=Object.create(E.prototype);return t.__wbg_ptr=_,M.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,M.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_keypair_free(t)}constructor(t,e){v(t,Q);var r=t.__destroy_into_raw();v(e,i_);var n=e.__destroy_into_raw();const i=_.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_provingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return Q.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_verifyingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return i_.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_metadata_free(t>>>0)));class I{static __wrap(_){_>>>=0;const t=Object.create(I.prototype);return t.__wbg_ptr=_,B.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_metadata_free(t)}get name(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_name(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set name(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_name(this.__wbg_ptr,e,r)}get locator(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set locator(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_locator(this.__wbg_ptr,e,r)}get prover(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set prover(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_prover(this.__wbg_ptr,e,r)}get verifier(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifier(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifier(this.__wbg_ptr,e,r)}get verifyingKey(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifyingKey(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,e,r)}static baseUrl(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.metadata_baseUrl(i);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static bond_public(){const t=_.metadata_bond_public();return I.__wrap(t)}static bond_validator(){const t=_.metadata_bond_validator();return I.__wrap(t)}static claim_unbond_public(){const t=_.metadata_claim_unbond_public();return I.__wrap(t)}static fee_private(){const t=_.metadata_fee_private();return I.__wrap(t)}static fee_public(){const t=_.metadata_fee_public();return I.__wrap(t)}static inclusion(){const t=_.metadata_inclusion();return I.__wrap(t)}static join(){const t=_.metadata_join();return I.__wrap(t)}static set_validator_state(){const t=_.metadata_set_validator_state();return I.__wrap(t)}static split(){const t=_.metadata_split();return I.__wrap(t)}static transfer_private(){const t=_.metadata_transfer_private();return I.__wrap(t)}static transfer_private_to_public(){const t=_.metadata_transfer_private_to_public();return I.__wrap(t)}static transfer_public(){const t=_.metadata_transfer_public();return I.__wrap(t)}static transfer_public_as_signer(){const t=_.metadata_transfer_public_as_signer();return I.__wrap(t)}static transfer_public_to_private(){const t=_.metadata_transfer_public_to_private();return I.__wrap(t)}static unbond_public(){const t=_.metadata_unbond_public();return I.__wrap(t)}}const U="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_offlinequery_free(t>>>0)));class C{static __wrap(_){_>>>=0;const t=Object.create(C.prototype);return t.__wbg_ptr=_,U.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,U.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_offlinequery_free(t)}constructor(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_new(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return this.__wbg_ptr=e>>>0,this}finally{_.__wbindgen_add_to_stack_pointer(16)}}addStatePath(t,e){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g,s=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),c=g;_.offlinequery_addStatePath(i,this.__wbg_ptr,o,a,s,c);var r=f()[i/4+0];if(f()[i/4+1])throw n(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.offlinequery_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return C.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekey_free(t>>>0)));class W{static __wrap(_){_>>>=0;const t=Object.create(W.prototype);return t.__wbg_ptr=_,q.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,q.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekey_free(t)}constructor(){const t=_.privatekey_new();return this.__wbg_ptr=t>>>0,this}static from_seed_unchecked(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_from_seed_unchecked(e,r);return W.__wrap(n)}static from_string(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_from_string(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_view_key(){const t=_.privatekey_to_view_key(this.__wbg_ptr);return a_.__wrap(t)}to_address(){const t=_.privatekey_to_address(this.__wbg_ptr);return T.__wrap(t)}sign(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_sign(this.__wbg_ptr,e,r);return t_.__wrap(n)}static newEncrypted(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_newEncrypted(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_toCiphertext(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,$);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_fromPrivateKeyCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return W.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekeyciphertext_free(t>>>0)));class ${static __wrap(_){_>>>=0;const t=Object.create($.prototype);return t.__wbg_ptr=_,N.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,N.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekeyciphertext_free(t)}static encryptPrivateKey(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_toCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return $.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_decryptToPrivateKey(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_program_free(t>>>0)));class J{static __wrap(_){_>>>=0;const t=Object.create(J.prototype);return t.__wbg_ptr=_,D.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_program_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return J.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}hasFunction(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;return 0!==_.program_hasFunction(this.__wbg_ptr,e,r)}getFunctions(){return n(_.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getFunctionInputs(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_getMappings(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return n(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getRecordMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getStructMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=_.program_getCreditsProgram();return J.__wrap(t)}id(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_id(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}address(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_address(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return T.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){v(t,J);return 0!==_.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return n(_.program_getImports(this.__wbg_ptr))}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_programmanager_free(t>>>0)));const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_provingkey_free(t>>>0)));class Q{static __wrap(_){_>>>=0;const t=Object.create(Q.prototype);return t.__wbg_ptr=_,L.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_provingkey_free(t)}isBondPublicProver(){return 0!==_.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==_.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==_.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==_.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==_.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==_.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==_.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==_.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==_.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==_.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==_.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==_.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==_.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==_.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==_.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.provingkey_copy(this.__wbg_ptr);return Q.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.provingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.provingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const X="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordciphertext_free(t>>>0)));class G{static __wrap(_){_>>>=0;const t=Object.create(G.prototype);return t.__wbg_ptr=_,X.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,X.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordciphertext_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return G.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}decrypt(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16);v(t,a_),_.recordciphertext_decrypt(i,this.__wbg_ptr,t.__wbg_ptr);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isOwner(t){v(t,a_);return 0!==_.recordciphertext_isOwner(this.__wbg_ptr,t.__wbg_ptr)}}const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordplaintext_free(t>>>0)));class Z{static __wrap(_){_>>>=0;const t=Object.create(Z.prototype);return t.__wbg_ptr=_,Y.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordplaintext_free(t)}commitment(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.recordplaintext_commitment(o,this.__wbg_ptr,a,s,c,w);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return K.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordplaintext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}microcredits(){const t=_.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,t)}nonce(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_nonce(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}serialNumberString(t,e,r){let i,o;try{const p=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const y=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;_.recordplaintext_serialNumberString(p,this.__wbg_ptr,t.__wbg_ptr,y,m,h,k);var a=f()[p/4+0],c=f()[p/4+1],w=f()[p/4+2],d=f()[p/4+3],l=a,u=c;if(d)throw l=0,u=0,n(w);return i=l,o=u,s(l,u)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(i,o,1)}}}const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_signature_free(t>>>0)));class t_{static __wrap(_){_>>>=0;const t=Object.create(t_.prototype);return t.__wbg_ptr=_,__.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_signature_free(t)}static sign(t,e){v(t,W);const r=k(e,_.__wbindgen_malloc),n=g,i=_.privatekey_sign(t.__wbg_ptr,r,n);return t_.__wrap(i)}verify(t,e){v(t,T);const r=k(e,_.__wbindgen_malloc),n=g;return 0!==_.signature_verify(this.__wbg_ptr,t.__wbg_ptr,r,n)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.signature_from_string(e,r);return t_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.signature_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_transaction_free(t>>>0)));class r_{static __wrap(_){_>>>=0;const t=Object.create(r_.prototype);return t.__wbg_ptr=_,e_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_transaction_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.transaction_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return r_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionType(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionType(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_verifyingkey_free(t>>>0)));class i_{static __wrap(_){_>>>=0;const t=Object.create(i_.prototype);return t.__wbg_ptr=_,n_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_verifyingkey_free(t)}static bondPublicVerifier(){const t=_.verifyingkey_bondPublicVerifier();return i_.__wrap(t)}static bondValidatorVerifier(){const t=_.verifyingkey_bondValidatorVerifier();return i_.__wrap(t)}static claimUnbondPublicVerifier(){const t=_.verifyingkey_claimUnbondPublicVerifier();return i_.__wrap(t)}static feePrivateVerifier(){const t=_.verifyingkey_feePrivateVerifier();return i_.__wrap(t)}static feePublicVerifier(){const t=_.verifyingkey_feePublicVerifier();return i_.__wrap(t)}static inclusionVerifier(){const t=_.verifyingkey_inclusionVerifier();return i_.__wrap(t)}static joinVerifier(){const t=_.verifyingkey_joinVerifier();return i_.__wrap(t)}static setValidatorStateVerifier(){const t=_.verifyingkey_setValidatorStateVerifier();return i_.__wrap(t)}static splitVerifier(){const t=_.verifyingkey_splitVerifier();return i_.__wrap(t)}static transferPrivateVerifier(){const t=_.verifyingkey_transferPrivateVerifier();return i_.__wrap(t)}static transferPrivateToPublicVerifier(){const t=_.verifyingkey_transferPrivateToPublicVerifier();return i_.__wrap(t)}static transferPublicVerifier(){const t=_.verifyingkey_transferPublicVerifier();return i_.__wrap(t)}static transferPublicAsSignerVerifier(){const t=_.verifyingkey_transferPublicAsSignerVerifier();return i_.__wrap(t)}static transferPublicToPrivateVerifier(){const t=_.verifyingkey_transferPublicToPrivateVerifier();return i_.__wrap(t)}static unbondPublicVerifier(){const t=_.verifyingkey_unbondPublicVerifier();return i_.__wrap(t)}isBondPublicVerifier(){return 0!==_.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==_.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==_.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==_.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==_.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==_.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==_.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==_.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==_.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==_.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==_.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==_.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==_.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==_.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==_.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.verifyingkey_copy(this.__wbg_ptr);return i_.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.verifyingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.verifyingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_viewkey_free(t>>>0)));class a_{static __wrap(_){_>>>=0;const t=Object.create(a_.prototype);return t.__wbg_ptr=_,o_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_viewkey_free(t)}static from_private_key(t){v(t,W);const e=_.privatekey_to_view_key(t.__wbg_ptr);return a_.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.viewkey_from_string(e,r);return a_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.viewkey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_address(){const t=_.address_from_view_key(this.__wbg_ptr);return T.__wrap(t)}decrypt(t){let e,r;try{const l=_.__wbindgen_add_to_stack_pointer(-16),u=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),p=g;_.viewkey_decrypt(l,this.__wbg_ptr,u,p);var i=f()[l/4+0],o=f()[l/4+1],a=f()[l/4+2],c=f()[l/4+3],w=i,d=o;if(c)throw w=0,d=0,n(a);return e=w,r=d,s(w,d)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(e,r,1)}}}function s_(){const t={wbg:{}};return t.wbg.__wbindgen_object_drop_ref=function(_){n(_)},t.wbg.__wbg_new_71801a555ad9f2aa=function(){return x((function(){return c(new XMLHttpRequest)}),arguments)},t.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return x((function(_,t,r){e(_).overrideMimeType(s(t,r))}),arguments)},t.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return x((function(_,t,r,n,i,o){e(_).open(s(t,r),s(n,i),0!==o)}),arguments)},t.wbg.__wbg_send_80d29985093c1ec5=function(){return x((function(_){e(_).send()}),arguments)},t.wbg.__wbg_response_7c2e2759084f7279=function(){return x((function(_){return c(e(_).response)}),arguments)},t.wbg.__wbg_status_d485fb5a478426fb=function(){return x((function(_){return e(_).status}),arguments)},t.wbg.__wbg_new_72fb9a18b5ae2624=function(){return c(new Object)},t.wbg.__wbindgen_string_new=function(_,t){return c(s(_,t))},t.wbg.__wbg_set_1f9b04f170055d33=function(){return x((function(_,t,r){return Reflect.set(e(_),e(t),e(r))}),arguments)},t.wbg.__wbg_new_ab6fd82b10560829=function(){return x((function(){return c(new Headers)}),arguments)},t.wbg.__wbindgen_object_clone_ref=function(_){return c(e(_))},t.wbg.__wbg_new_0d76b0581eca6298=function(){return x((function(){return c(new AbortController)}),arguments)},t.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return c(e(_).signal)},t.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return x((function(_,t,r,n,i){e(_).append(s(t,r),s(n,i))}),arguments)},t.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=e(_)instanceof Response}catch(_){t=!1}return t},t.wbg.__wbg_status_61a01141acd3cf74=function(_){return e(_).status},t.wbg.__wbg_url_5f6dc4009ac5f99d=function(t,r){const n=b(e(r).url,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_headers_9620bfada380764a=function(_){return c(e(_).headers)},t.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return c(Symbol.iterator)},t.wbg.__wbg_get_e3c254076557e348=function(){return x((function(_,t){return c(Reflect.get(e(_),e(t)))}),arguments)},t.wbg.__wbindgen_is_function=function(_){return"function"==typeof e(_)},t.wbg.__wbg_call_27c0f87801dedf93=function(){return x((function(_,t){return c(e(_).call(e(t)))}),arguments)},t.wbg.__wbindgen_is_object=function(_){const t=e(_);return"object"==typeof t&&null!==t},t.wbg.__wbg_next_40fc327bfc8770e6=function(_){return c(e(_).next)},t.wbg.__wbg_next_196c84450b364254=function(){return x((function(_){return c(e(_).next())}),arguments)},t.wbg.__wbg_done_298b57d23c0fc80c=function(_){return e(_).done},t.wbg.__wbg_value_d93c65011f51a456=function(_){return c(e(_).value)},t.wbg.__wbg_abort_2aa7521d5690750e=function(_){e(_).abort()},t.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return x((function(_){return c(JSON.stringify(e(_)))}),arguments)},t.wbg.__wbindgen_string_get=function(t,r){const n=e(r),i="string"==typeof n?n:void 0;var o=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;f()[t/4+1]=a,f()[t/4+0]=o},t.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(s(_,t))},t.wbg.__wbindgen_bigint_from_u64=function(_){return c(BigInt.asUintN(64,_))},t.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return x((function(_,t,r){return c(e(_).call(e(t),e(r)))}),arguments)},t.wbg.__wbg_transaction_new=function(_){return c(r_.__wrap(_))},t.wbg.__wbg_keypair_new=function(_){return c(E.__wrap(_))},t.wbg.__wbindgen_module=function(){return c(w_.__wbindgen_wasm_module)},t.wbg.__wbindgen_memory=function(){return c(_.memory)},t.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,r,n){return c(function(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}(e(_),e(t),e(r),n>>>0))},t.wbg.__wbg_executionresponse_new=function(_){return c(O.__wrap(_))},t.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return c(new Array(_>>>0))},t.wbg.__wbg_set_d4638f722068f043=function(_,t,r){e(_)[t>>>0]=n(r)},t.wbg.__wbindgen_cb_drop=function(_){const t=n(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},t.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return c(new Array)},t.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return e(_).push(e(t))},t.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return x((function(_){return c(e(_).arrayBuffer())}),arguments)},t.wbg.__wbg_new_63b92bc8671ed464=function(_){return c(new Uint8Array(e(_)))},t.wbg.__wbg_length_c20a40f15020d68a=function(_){return e(_).length},t.wbg.__wbg_new_81740750da40724f=function(t,e){try{var r={a:t,b:e};const n=new Promise(((t,e)=>{const n=r.a;r.a=0;try{return function(t,e,r,n){_.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(t,e,c(r),c(n))}(n,r.b,t,e)}finally{r.a=n}}));return c(n)}finally{r.a=r.b=0}},t.wbg.__wbindgen_number_new=function(_){return c(_)},t.wbg.__wbg_new_abda76e883ba8a5f=function(){return c(new Error)},t.wbg.__wbg_stack_658279fe44541cf6=function(t,r){const n=b(e(r).stack,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_error_f851667af71bcfc6=function(t,e){let r,n;try{r=t,n=e,console.error(s(t,e))}finally{_.__wbindgen_free(r,n,1)}},t.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return c(e(_).buffer)},t.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,r){return c(new Uint8Array(e(_),t>>>0,r>>>0))},t.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return x((function(_,t){e(_).randomFillSync(n(t))}),arguments)},t.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,r){return c(e(_).subarray(t>>>0,r>>>0))},t.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return x((function(_,t){e(_).getRandomValues(e(t))}),arguments)},t.wbg.__wbg_set_a47bac70306a19a7=function(_,t,r){e(_).set(e(t),r>>>0)},t.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return c(e(_).crypto)},t.wbg.__wbg_process_4a72847cc503995b=function(_){return c(e(_).process)},t.wbg.__wbg_versions_f686565e586dd935=function(_){return c(e(_).versions)},t.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return c(e(_).node)},t.wbg.__wbindgen_is_string=function(_){return"string"==typeof e(_)},t.wbg.__wbg_require_cca90b1a94a0255b=function(){return x((function(){return c(module.require)}),arguments)},t.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return c(e(_).msCrypto)},t.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return c(new Uint8Array(_>>>0))},t.wbg.__wbg_length_cd7af8117672b8b8=function(_){return e(_).length},t.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return c(e(_)[t>>>0])},t.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return x((function(){return c(self.self)}),arguments)},t.wbg.__wbg_window_c6fb939a7f436783=function(){return x((function(){return c(window.window)}),arguments)},t.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return x((function(){return c(globalThis.globalThis)}),arguments)},t.wbg.__wbg_global_207b558942527489=function(){return x((function(){return c(global.global)}),arguments)},t.wbg.__wbindgen_is_undefined=function(_){return void 0===e(_)},t.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return c(new Function(s(_,t)))},t.wbg.__wbg_has_0af94d20077affa2=function(){return x((function(_,t){return Reflect.has(e(_),e(t))}),arguments)},t.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return c(fetch(e(_)))},t.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return c(e(_).fetch(e(t)))},t.wbg.__wbindgen_debug_string=function(t,r){const n=b(p(e(r)),_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbindgen_throw=function(_,t){throw new Error(s(_,t))},t.wbg.__wbindgen_rethrow=function(_){throw n(_)},t.wbg.__wbg_then_a73caa9a87991566=function(_,t,r){return c(e(_).then(e(t),e(r)))},t.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return c(e(_).then(e(t)))},t.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(e(_))},t.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return c(e(_).queueMicrotask)},t.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return c(Promise.resolve(e(_)))},t.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return c(Atomics.waitAsync)},t.wbg.__wbg_new_8cccba86b0f574cb=function(_){return c(new Int32Array(e(_)))},t.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,r){return c(Atomics.waitAsync(e(_),t,r))},t.wbg.__wbg_async_19c0400d97cc72fe=function(_){return e(_).async},t.wbg.__wbg_value_571d60108110e917=function(_){return c(e(_).value)},t.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(t){const e=b("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;f()[t/4+1]=r,f()[t/4+0]=e},t.wbg.__wbg_new_d1187ae36d662ef9=function(){return x((function(_,t){return c(new Worker(s(_,t)))}),arguments)},t.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){e(_).onmessage=e(t)},t.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,r){return c(Array.of(e(_),e(t),e(r)))},t.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return x((function(_,t){e(_).postMessage(e(t))}),arguments)},t.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return c(e(_).data)},t.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return x((function(_,t,r){return c(new Request(s(_,t),e(r)))}),arguments)},t.wbg.__wbg_responseText_c67ed2d48db10769=function(){return x((function(t,r){const n=e(r).responseText;var i=l(n)?0:b(n,_.__wbindgen_malloc,_.__wbindgen_realloc),o=g;f()[t/4+1]=o,f()[t/4+0]=i}),arguments)},t.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return c(m(_,t,538,h))},t.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return c(m(_,t,538,h))},t}function c_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function g_(t,e){return _=t.exports,w_.__wbindgen_wasm_module=e,P=null,u=null,o=null,_.__wbindgen_start(),_}async function w_(t,e){if(void 0!==_)return _;const r=s_();("string"==typeof t||"function"==typeof Request&&t instanceof Request||"function"==typeof URL&&t instanceof URL)&&(t=fetch(t)),c_(r,e);const{instance:n,module:i}=await async function(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}(await t,r);return g_(n,i)}var d_=Object.freeze({__proto__:null,Address:T,Execution:z,ExecutionResponse:O,Field:K,KeyPair:E,Metadata:I,OfflineQuery:C,PrivateKey:W,PrivateKeyCiphertext:$,Program:J,ProgramManager:class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_programmanager_free(t)}static buildDeploymentTransaction(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g;let p=0;l(i)||(v(i,Z),p=i.__destroy_into_raw());var y=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g;let h=0;l(s)||(v(s,Q),h=s.__destroy_into_raw());let k=0;l(w)||(v(w,i_),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,C),P=d.__destroy_into_raw());return n(_.programmanager_buildDeploymentTransaction(t.__wbg_ptr,u,f,r,p,y,m,l(a)?0:c(a),h,k,P))}static estimateDeploymentFee(t,e){const r=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;return n(_.programmanager_estimateDeploymentFee(r,i,l(e)?0:c(e)))}static estimateProgramNameCost(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.programmanager_estimateProgramNameCost(i,o,a);var e=S()[i/8+0],r=f()[i/4+2];if(f()[i/4+3])throw n(r);return BigInt.asUintN(64,e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(t,e,r,i,o,a,s,w,d,u,f){v(t,W);const p=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g,m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(w)||(v(w,Q),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,i_),P=d.__destroy_into_raw());var S=l(u)?0:b(u,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(f)||(v(f,C),x=f.__destroy_into_raw());return n(_.programmanager_executeFunctionOffline(t.__wbg_ptr,p,y,m,h,c(i),o,a,l(s)?0:c(s),k,P,S,V,x))}static buildExecutionTransaction(t,e,r,i,o,a,s,w,d,u,f,p,y){v(t,W);const m=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;let S=0;l(a)||(v(a,Z),S=a.__destroy_into_raw());var V=l(s)?0:b(s,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(d)||(v(d,Q),F=d.__destroy_into_raw());let T=0;l(u)||(v(u,i_),T=u.__destroy_into_raw());let R=0;l(f)||(v(f,Q),R=f.__destroy_into_raw());let z=0;l(p)||(v(p,i_),z=p.__destroy_into_raw());let A=0;l(y)||(v(y,C),A=y.__destroy_into_raw());return n(_.programmanager_buildExecutionTransaction(t.__wbg_ptr,m,h,k,P,c(i),o,S,V,x,l(w)?0:c(w),F,T,R,z,A))}static estimateExecutionFee(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g,p=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g;var m=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(w)||(v(w,i_),P=w.__destroy_into_raw());let S=0;l(d)||(v(d,C),S=d.__destroy_into_raw());return n(_.programmanager_estimateExecutionFee(t.__wbg_ptr,u,f,p,y,c(i),m,h,l(a)?0:c(a),k,P,S))}static estimateFinalizeFee(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.programmanager_estimateFinalizeFee(o,a,s,c,w);var r=S()[o/8+0],i=f()[o/4+2];if(f()[o/4+3])throw n(i);return BigInt.asUintN(64,r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(t,e,r,i,o,a,s,c,w,d,u){v(t,W),v(e,Z);var f=e.__destroy_into_raw();v(r,Z);var p=r.__destroy_into_raw();let y=0;l(o)||(v(o,Z),y=o.__destroy_into_raw());var m=l(a)?0:b(a,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(c)||(v(c,i_),P=c.__destroy_into_raw());let S=0;l(w)||(v(w,Q),S=w.__destroy_into_raw());let V=0;l(d)||(v(d,i_),V=d.__destroy_into_raw());let x=0;l(u)||(v(u,C),x=u.__destroy_into_raw());return n(_.programmanager_buildJoinTransaction(t.__wbg_ptr,f,p,i,y,m,h,k,P,S,V,x))}static buildSplitTransaction(t,e,r,i,o,a,s){v(t,W),v(r,Z);var c=r.__destroy_into_raw(),w=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;let u=0;l(o)||(v(o,Q),u=o.__destroy_into_raw());let f=0;l(a)||(v(a,i_),f=a.__destroy_into_raw());let p=0;l(s)||(v(s,C),p=s.__destroy_into_raw());return n(_.programmanager_buildSplitTransaction(t.__wbg_ptr,e,c,w,d,u,f,p))}static buildTransferTransaction(t,e,r,i,o,a,s,c,w,d,u,f,p){v(t,W);const y=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;let P=0;l(o)||(v(o,Z),P=o.__destroy_into_raw());let S=0;l(s)||(v(s,Z),S=s.__destroy_into_raw());var V=l(c)?0:b(c,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(w)||(v(w,Q),F=w.__destroy_into_raw());let T=0;l(d)||(v(d,i_),T=d.__destroy_into_raw());let R=0;l(u)||(v(u,Q),R=u.__destroy_into_raw());let z=0;l(f)||(v(f,i_),z=f.__destroy_into_raw());let A=0;l(p)||(v(p,C),A=p.__destroy_into_raw());return n(_.programmanager_buildTransferTransaction(t.__wbg_ptr,e,y,m,h,k,P,a,S,V,x,F,T,R,z,A))}static synthesizeKeyPair(t,e,r,i,o){v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,w=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;return n(_.programmanager_synthesizeKeyPair(t.__wbg_ptr,a,s,w,d,c(i),l(o)?0:c(o)))}},ProvingKey:Q,RecordCiphertext:G,RecordPlaintext:Z,Signature:t_,Transaction:r_,VerifyingKey:i_,ViewKey:a_,default:w_,initSync:function(t,e){if(void 0!==_)return _;const r=s_();return c_(r,e),t instanceof WebAssembly.Module||(t=new WebAssembly.Module(t)),g_(new WebAssembly.Instance(t,r),t)},initThreadPool:function(t,e){return n(_.initThreadPool(c(t),e))},runRayonThread:function(t){_.runRayonThread(t)},verifyFunctionExecution:function(t,e,r,i){try{const s=_.__wbindgen_add_to_stack_pointer(-16);v(t,z),v(e,i_),v(r,J);const c=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.verifyFunctionExecution(s,t.__wbg_ptr,e.__wbg_ptr,r.__wbg_ptr,c,w);var o=f()[s/4+0],a=f()[s/4+1];if(f()[s/4+2])throw n(a);return 0!==o}finally{_.__wbindgen_add_to_stack_pointer(16)}}});await async function(_){const[t,{module:e,memory:r,address:n}]=await Promise.all([_,new Promise((_=>{addEventListener("message",(t=>{_(t.data)}),{capture:!0,once:!0})}))]),i=await t({initializeHook:(_,t)=>_(e,r)});postMessage(null),i.runRayonThread(n),close()}((async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n="assets/aleo_wasm.wasm";return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(w_,n):await w_(n),d_})); \ No newline at end of file diff --git a/301.bundle.js b/301.bundle.js new file mode 100644 index 000000000..92495ece5 --- /dev/null +++ b/301.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={301:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=301.bundle.js.map \ No newline at end of file diff --git a/301.bundle.js.map b/301.bundle.js.map new file mode 100644 index 000000000..f83a620a9 --- /dev/null +++ b/301.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"301.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t301: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/383.bundle.js b/383.bundle.js index 725c37b35..61e9b3aaa 100644 --- a/383.bundle.js +++ b/383.bundle.js @@ -1,3 +1,3 @@ /*! For license information please see 383.bundle.js.LICENSE.txt */ -(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[383],{5052:(e,t,r)=>{r.a(e,(async(e,n)=>{try{r.d(t,{AleoKeyProvider:()=>y,AleoKeyProviderParams:()=>p,PrivateKey:()=>o._q,ProgramManager:()=>d,ProgramManagerBase:()=>o.L,initThreadPool:()=>o.CK,verifyFunctionExecution:()=>o.hz});var o=r(9933),i=e([o]);o=(i.then?(await i)():i)[0];async function a(e,t){const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not get URL "+e);return r}async function s(e,t){t.method="POST";const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not post URL "+e);return r}class f{host;headers;account;constructor(e,t){this.host=e+"/testnet",t&&t.headers?this.headers=t.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const t=await a(this.host+e,{headers:this.headers});return await t.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,t,r,n,i,a){if(a=a||[],e<0)throw new Error("Start height must be greater than or equal to 0");const s=new Array;let c,u,l,h,f=0,p=BigInt(0);if(void 0===r){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");l=this.account._privateKey}else try{l=r instanceof o._q?r:o._q.from_string(r)}catch(e){throw new Error("Error parsing private key provided.")}const y=l.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");h=e}catch(e){throw new Error("Error fetching latest block height.")}if(u="number"==typeof t&&t<=h?t:h,e>u)throw new Error("Start height must be less than or equal to end height.");for(;u>e;){c=u-50,c=BigInt(i))))return s;if(void 0!==n&&n.length>0){let e=0;if(t.microcredits()>n[e]){if(e+=1,s.push(t),"number"==typeof i&&(p+=t.microcredits(),p>=BigInt(i)))return s;if(s.length>=n.length)return s}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+c.toString()+"-"+u.toString()),console.warn("Error: ",e),f+=1,f>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),s}}return s}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,t){try{return await this.fetchData("/blocks?start="+e+"&end="+t)}catch(r){throw new Error("Error fetching blocks between "+e+" and "+t+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof o.$r&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const t=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(t)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return o.$r.fromString(e)}catch(t){try{return o.$r.fromString(await this.getProgram(e))}catch(t){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const t={},r=(e instanceof o.$r?e:await this.getProgramObject(e)).getImports();for(let e=0;e0&&!g)try{g=await this.networkClient.getProgramImports(t)}catch(e){throw h(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await o.L.buildExecutionTransaction(m,d,r,a,n,f,this.host,g,p,y,w,b,l)}async execute(e){const t=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(t)}async run(e,t,r,n,i,a,s,c,u,l){let h=u;if(void 0===u&&void 0!==this.account&&(h=this.account.privateKey()),void 0===h)throw"No private key provided and no private key set in the ProgramManager";if(!s||!c)try{[s,c]=await this.keyProvider.functionKeys(a)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",s),console.log("Verifying key: ",c),o.L.executeFunctionOffline(h,e,t,r,n,!1,i,s,c,this.host,l)}async join(e,t,r,n,i,a,s,c){let u,l,f=s;if(void 0===s&&void 0!==this.account&&(f=this.account.privateKey()),void 0===f)throw"No private key provided and no private key set in the ProgramManager";try{u=n?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),l=await this.keyProvider.joinKeys()}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[p,y]=u,[d,g]=l;try{a=n?await this.getCreditsRecord(r,[],a,i):void 0}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof o.PD?e:o.PD.fromString(e),t=t instanceof o.PD?t:o.PD.fromString(t)}catch(e){throw h("Records provided are not valid. Please ensure they are valid plaintext records.")}const v=await o.L.buildJoinTransaction(f,e,t,r,a,this.host,d,g,p,y,c);return await this.networkClient.submitTransaction(v)}async split(e,t,r,n){let i,a=r;if(void 0===a&&void 0!==this.account&&(a=this.account.privateKey()),void 0===a)throw"No private key provided and no private key set in the ProgramManager";try{i=await this.keyProvider.splitKeys()}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[s,c]=i;try{t=t instanceof o.PD?t:o.PD.fromString(t)}catch(e){throw h("Record provided is not valid. Please ensure it is a valid plaintext record.")}const u=await o.L.buildSplitTransaction(a,e,t,this.host,s,c,n);return await this.networkClient.submitTransaction(u)}async synthesizeKeys(e,t,r,n){let i,a=n;void 0===a&&(a=void 0!==this.account?this.account.privateKey():new o._q);try{i=await this.networkClient.getProgramImports(e);const n=await o.L.synthesizeKeyPair(a,e,t,r,i);return[n.provingKey(),n.verifyingKey()]}catch(e){throw h(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,t,r,n,i,a,s,l,f,p){r=u(r);let y,d,g=f;if(void 0===g&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";try{y=i?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),d=await this.keyProvider.transferKeys(r)}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[v,m]=y,[w,b]=d;try{const e=[];c(r)?(s=await this.getCreditsRecord(n,[],s,a),e.push(s.nonce())):s=void 0,l=i?await this.getCreditsRecord(n,e,l,a):void 0}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await o.L.buildTransferTransaction(g,e,t,r,s,n,l,this.host,w,b,v,m,p)}async buildTransferPublicTransaction(e,t,r,n,o){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,o)}async buildTransferPublicAsSignerTransaction(e,t,r,n,o){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,o)}async transfer(e,t,r,n,o,i,a,s,c,u){const l=await this.buildTransferTransaction(e,t,r,n,o,i,a,s,c,u);return await this.networkClient.submitTransaction(l)}async buildBondPublicTransaction(e,t,r,n,o={}){const i=Math.trunc(1e6*n),{programName:a="credits.aleo",functionName:s="bond_public",fee:c=o.fee||.86,privateFee:u=!1,inputs:l=[e,t,r,`${i.toString()}u64`],keySearchParams:h=new p({proverUri:v.bond_public.prover,verifierUri:v.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:f=this.creditsProgram(),...y}=o,d={programName:a,functionName:s,fee:c,privateFee:u,inputs:l,keySearchParams:h,...y};return await this.buildExecutionTransaction(d)}async bondPublic(e,t,r,n,o={}){const i=await this.buildBondPublicTransaction(e,t,r,n,o);return await this.networkClient.submitTransaction(i)}async buildBondValidatorTransaction(e,t,r,n,o={}){const i=Math.trunc(1e6*r),a=Math.trunc(n),{programName:s="credits.aleo",functionName:c="bond_validator",fee:u=o.fee||.86,privateFee:l=!1,inputs:h=[e,t,`${i.toString()}u64`,`${a.toString()}u8`],keySearchParams:f=new p({proverUri:v.bond_validator.prover,verifierUri:v.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:y=this.creditsProgram(),...d}=o,g={programName:s,functionName:c,fee:u,privateFee:l,inputs:h,keySearchParams:f,...d};return await this.buildExecutionTransaction(g)}async bondValidator(e,t,r,n,o={}){const i=await this.buildBondValidatorTransaction(e,t,r,n,o);return await this.networkClient.submitTransaction(i)}async buildUnbondPublicTransaction(e,t,r={}){const n=Math.trunc(1e6*t),{programName:o="credits.aleo",functionName:i="unbond_public",fee:a=r.fee||1.3,privateFee:s=!1,inputs:c=[e,`${n.toString()}u64`],keySearchParams:u=new p({proverUri:v.unbond_public.prover,verifierUri:v.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:l=this.creditsProgram(),...h}=r,f={programName:o,functionName:i,fee:a,privateFee:s,inputs:c,keySearchParams:u,...h};return this.buildExecutionTransaction(f)}async unbondPublic(e,t,r={}){const n=await this.buildUnbondPublicTransaction(e,t,r);return await this.networkClient.submitTransaction(n)}async buildClaimUnbondPublicTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="claim_unbond_public",fee:o=t.fee||2,privateFee:i=!1,inputs:a=[e],keySearchParams:s=new p({proverUri:v.claim_unbond_public.prover,verifierUri:v.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:c=this.creditsProgram(),...u}=t,l={programName:r,functionName:n,fee:o,privateFee:i,inputs:a,keySearchParams:s,...u};return await this.buildExecutionTransaction(l)}async claimUnbondPublic(e,t={}){const r=await this.buildClaimUnbondPublicTransaction(e,t);return await this.networkClient.submitTransaction(r)}async buildSetValidatorStateTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="set_validator_state",fee:o=1,privateFee:i=!1,inputs:a=[e.toString()],keySearchParams:s=new p({proverUri:v.set_validator_state.prover,verifierUri:v.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...c}=t,u={programName:r,functionName:n,fee:o,privateFee:i,inputs:a,keySearchParams:s,...c};return await this.execute(u)}async setValidatorState(e,t={}){const r=await this.buildSetValidatorStateTransaction(e,t);return this.networkClient.submitTransaction(r)}verifyExecution(e){try{const t=e.getExecution(),r=e.getFunctionId(),n=e.getProgram(),i=e.getVerifyingKey();return(0,o.hz)(t,i,n,r)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return o.$r.fromString(e)}creditsProgram(){return o.$r.getCreditsProgram()}verifyProgram(e){try{return o.$r.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,t,r,n){try{return r instanceof o.PD?r:o.PD.fromString(r)}catch(r){try{const r=this.recordProvider;return await r.findCreditsRecord(e,!0,t,n)}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function c(e){return m.has(e)}function u(e){return w.has(e)?e:h(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const g=o.SF.baseUrl();function l(e){const t=o.XV[e.verifyingKey];if(!t)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:t}}const v={bond_public:l(o.SF.bond_public()),bond_validator:l(o.SF.bond_validator()),claim_unbond_public:l(o.SF.claim_unbond_public()),fee_private:l(o.SF.fee_private()),fee_public:l(o.SF.fee_public()),inclusion:l(o.SF.inclusion()),join:l(o.SF.join()),set_validator_state:l(o.SF.set_validator_state()),split:l(o.SF.split()),transfer_private:l(o.SF.transfer_private()),transfer_private_to_public:l(o.SF.transfer_private_to_public()),transfer_public:l(o.SF.transfer_public()),transfer_public_as_signer:l(o.SF.transfer_public_as_signer()),transfer_public_to_private:l(o.SF.transfer_public_to_private()),unbond_public:l(o.SF.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},m=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),w=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),b=new Set(["private","transfer_private","transferPrivate"]),_=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),P=new Set(["public","transfer_public","transferPublic"]),E=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),k=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function h(e){throw console.error(e),e}n()}catch(K){n(K)}}))},5383:(e,t,r)=>{r.a(e,(async(e,t)=>{try{var n=r(5052),o=e([n]);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function a(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}function s(e,t){if(e){if("string"==typeof e)return c(e,t);var r=Object.prototype.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?c(e,t):void 0}}function c(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=new Array(t);r=0;--i){var a=this.tryEntries[i],s=a.completion;if("root"===a.tryLoc)return o("end");if(a.tryLoc<=this.prev){var c=n.call(a,"catchLoc"),u=n.call(a,"finallyLoc");if(c&&u){if(this.prev=0;--r){var o=this.tryEntries[r];if(o.tryLoc<=this.prev&&n.call(o,"finallyLoc")&&this.prev=0;--t){var r=this.tryEntries[t];if(r.finallyLoc===e)return this.complete(r.completion,r.afterLoc),N(r),m}},catch:function(e){for(var t=this.tryEntries.length-1;t>=0;--t){var r=this.tryEntries[t];if(r.tryLoc===e){var n=r.completion;if("throw"===n.type){var o=n.arg;N(r)}return o}}throw new Error("illegal catch attempt")},delegateYield:function(t,r,n){return this.delegate={iterator:F(t),resultName:r,nextLoc:n},"next"===this.method&&(this.arg=e),m}},t}function f(e,t,r,n,o,i,a){try{var s=e[i](a),c=s.value}catch(e){return void r(e)}s.done?t(c):Promise.resolve(c).then(n,o)}function p(e){return function(){var t=this,r=arguments;return new Promise((function(n,o){var i=e.apply(t,r);function a(e){f(i,n,o,a,s,"next",e)}function s(e){f(i,n,o,a,s,"throw",e)}a(void 0)}))}}n=(o.then?(await o)():o)[0],await n.initThreadPool();var y="https://api.explorer.provable.com/v1",d=new n.AleoKeyProvider,g=new n.ProgramManager(y,d,void 0);d.useCache(!0),self.postMessage({type:"ALEO_WORKER_READY"});var v=null;self.addEventListener("message",(function(e){if("ALEO_EXECUTE_PROGRAM_LOCAL"===e.data.type){var t=e.data,r=t.localProgram,o=t.aleoFunction,i=t.inputs,c=t.privateKey;console.log("Web worker: Executing function locally...");var f=performance.now();p(h().mark((function e(){var t,a,s,u,l,p,y,m,w,b;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:if(e.prev=0,t=n.PrivateKey.from_string(c),a=g.createProgramFromSource(r),s=a.id(),a.hasFunction(o)){e.next=6;break}throw"Program ".concat(s," does not contain function ").concat(o);case 6:if(u="".concat(s,":").concat(o),l=g.networkClient.getProgramImports(r),v===r){e.next=14;break}return e.next=11,g.synthesizeKeys(r,o,i,t);case 11:p=e.sent,g.keyProvider.cacheKeys(u,p),v=r;case 14:return y=new n.AleoKeyProviderParams({cacheKey:u}),e.next=17,g.run(r,o,i,!1,l,y,void 0,void 0,t,void 0);case 17:m=e.sent,console.log("Web worker: Local execution completed in ".concat(performance.now()-f," ms")),w=m.getOutputs(),(b=m.getExecution())?(n.verifyFunctionExecution(b,d.getKeys(u)[1],a,"hello"),b=b.toString(),console.log("Execution verified successfully: "+b)):b="",console.log("Function execution response: ".concat(w)),self.postMessage({type:"OFFLINE_EXECUTION_COMPLETED",outputs:{outputs:w,execution:b}}),e.next=30;break;case 26:e.prev=26,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 30:case"end":return e.stop()}}),e,null,[[0,26]])})))()}else if("ALEO_EXECUTE_PROGRAM_ON_CHAIN"===e.data.type){var m=e.data,w=m.remoteProgram,b=m.aleoFunction,_=m.inputs,P=m.privateKey,E=m.fee,k=m.privateFee,K=m.feeRecord,T=m.url;console.log("Web worker: Creating execution...");var S=performance.now();p(h().mark((function e(){var t,r,o,i,a,s,c;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(P),e.next=4,g.networkClient.getProgramObject(w);case 4:if(r=e.sent,o=r.id(),r.hasFunction(b)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(b);case 8:if(i="".concat(o,":").concat(b),g.keyProvider.containsKeys(i)){e.next=15;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(b,"'")),e.next=13,g.synthesizeKeys(w,b,_,t);case 13:a=e.sent,g.keyProvider.cacheKeys(i,a);case 15:return s=new n.AleoKeyProviderParams({cacheKey:i}),"string"==typeof T&&g.setHost(T),e.next=19,g.execute({programName:o,functionName:b,fee:E,privateFee:k,inputs:_,keySearchParams:s,feeRecord:K,privateKey:t});case 19:c=e.sent,console.log("Web worker: On-chain execution transaction created in ".concat(performance.now()-S," ms")),self.postMessage({type:"EXECUTION_TRANSACTION_COMPLETED",executeTransaction:c}),e.next=28;break;case 24:e.prev=24,e.t0=e.catch(0),console.error("Error creating execution transaction: ".concat(e.t0)),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 28:return e.prev=28,g.setHost(y),e.finish(28);case 31:case"end":return e.stop()}}),e,null,[[0,24,28,31]])})))()}else if("ALEO_ESTIMATE_EXECUTION_FEE"===e.data.type){var x=e.data,O=x.remoteProgram,C=x.privateKey,N=x.aleoFunction,R=x.inputs,F=x.url;console.log("Web worker: Estimating execution fee...");var L=performance.now();p(h().mark((function e(){var t,r,o,i,c,f,p,y,d,v,m;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(C),e.next=4,g.networkClient.getProgramObject(O);case 4:if(r=e.sent,o=r.id(),r.getFunctions().includes(N)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(N);case 8:return i="".concat(o,":").concat(N),e.next=11,g.networkClient.getProgramImports(O);case 11:if(c=e.sent,g.keyProvider.containsKeys(i)){e.next=18;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(N,"'")),e.next=16,g.synthesizeKeys(r.toString(),N,R,t);case 16:f=e.sent,g.keyProvider.cacheKeys(i,f);case 18:return p=g.keyProvider.getKeys(i),w=2,y=l(h=p)||u(h,w)||s(h,w)||a(),d=y[0],v=y[1],e.next=21,n.ProgramManagerBase.estimateExecutionFee(t,O,N,R,F,c,d,v,void 0);case 21:m=e.sent,console.log("Web worker: Execution fee estimated in ".concat(performance.now()-L," ms")),console.log("Execution Fee Estimation: ".concat(m," microcredits")),self.postMessage({type:"EXECUTION_FEE_ESTIMATION_COMPLETED",executionFee:Number(m)/1e6+.01}),e.next=31;break;case 27:e.prev=27,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 31:case"end":return e.stop()}var h,w}),e,null,[[0,27]])})))()}else if("ALEO_ESTIMATE_DEPLOYMENT_FEE"===e.data.type){var A=e.data,M=A.program;A.url;console.log("Web worker: Estimating deployment fee...");var I=performance.now();p(h().mark((function e(){var t,r;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,e.next=3,g.networkClient.getProgramImports(M);case 3:return t=e.sent,console.log("Estimating deployment fee.."),e.next=7,n.ProgramManagerBase.estimateDeploymentFee(M,t);case 7:r=e.sent,console.log("Web worker: Deployment fee estimation completed in ".concat(performance.now()-I," ms")),console.log("Deployment Fee Estimation: ".concat(r," microcredits")),self.postMessage({type:"DEPLOYMENT_FEE_ESTIMATION_COMPLETED",deploymentFee:Number(r)/1e6+.01}),e.next=17;break;case 13:e.prev=13,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 17:case"end":return e.stop()}}),e,null,[[0,13]])})))()}else if("ALEO_TRANSFER"===e.data.type){var D=e.data,$=D.privateKey,U=D.amountCredits,B=D.recipient,j=D.transfer_type,W=D.amountRecord,V=D.fee,z=D.privateFee,H=D.feeRecord,X=D.url;console.log("Web worker: Creating transfer of type ".concat(j,"..."));var G=performance.now();p(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof X&&g.setHost(X),e.next=4,g.transfer(U,B,j,V,z,void 0,W,H,n.PrivateKey.from_string($),void 0);case 4:t=e.sent,console.log("Web worker: Transfer transaction ".concat(t," created in ").concat(performance.now()-G," ms")),self.postMessage({type:"TRANSFER_TRANSACTION_COMPLETED",transferTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(y),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_DEPLOY"===e.data.type){var Y=e.data,q=Y.program,J=Y.privateKey,Q=Y.fee,Z=Y.privateFee,ee=Y.feeRecord,te=Y.url;console.log("Web worker: Creating deployment...");var re=performance.now();p(h().mark((function e(){var t,r,o;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof te&&g.setHost(te),t=g.createProgramFromSource(q),r=!1,e.prev=4,e.next=7,g.networkClient.getProgram(t.id());case 7:r=!0,e.next=13;break;case 10:e.prev=10,e.t0=e.catch(4),console.log("Program not found on the Aleo Network - proceeding with deployment...");case 13:if(!r){e.next=15;break}throw"Program ".concat(t.id()," already exists on the network");case 15:return console.log("fee is: ",Q),e.next=18,g.deploy(q,Q,Z,void 0,ee,n.PrivateKey.from_string(J));case 18:o=e.sent,console.log("Web worker: Deployment transaction ".concat(o," created in ").concat(performance.now()-re," ms")),self.postMessage({type:"DEPLOY_TRANSACTION_COMPLETED",deployTransaction:o}),e.next=27;break;case 23:e.prev=23,e.t1=e.catch(0),console.log(e.t1),self.postMessage({type:"ERROR",errorMessage:e.t1.toString()});case 27:return e.prev=27,g.setHost(y),e.finish(27);case 30:case"end":return e.stop()}}),e,null,[[0,23,27,30],[4,10]])})))()}else if("ALEO_SPLIT"===e.data.type){var ne=e.data,oe=ne.splitAmount,ie=ne.record,ae=ne.privateKey,se=ne.url;console.log("Web worker: Creating split...");var ce=performance.now();p(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof se&&g.setHost(se),e.next=4,g.split(oe,ie,n.PrivateKey.from_string(ae),void 0);case 4:t=e.sent,console.log("Web worker: Split transaction ".concat(t," created in ").concat(performance.now()-ce," ms")),self.postMessage({type:"SPLIT_TRANSACTION_COMPLETED",splitTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(y),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_JOIN"===e.data.type){var ue=e.data,le=ue.recordOne,he=ue.recordTwo,fe=ue.fee,pe=ue.privateFee,ye=ue.feeRecord,de=ue.privateKey,ge=ue.url;console.log("Web worker: Creating join...");var ve=performance.now();p(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof ge&&g.setHost(ge),e.next=4,g.join(le,he,fe,pe,void 0,ye,n.PrivateKey.from_string(de),void 0);case 4:t=e.sent,console.log("Web worker: Join transaction ".concat(t," created in ").concat(performance.now()-ve," ms")),self.postMessage({type:"JOIN_TRANSACTION_COMPLETED",joinTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(y),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}})),t()}catch(m){t(m)}}),1)}}]); +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[383],{5052:(e,t,r)=>{r.a(e,(async(e,n)=>{try{r.d(t,{AleoKeyProvider:()=>p,AleoKeyProviderParams:()=>y,PrivateKey:()=>o._q,ProgramManager:()=>d,ProgramManagerBase:()=>o.L,initThreadPool:()=>o.CK,verifyFunctionExecution:()=>o.hz});var o=r(9933),i=e([o]);o=(i.then?(await i)():i)[0];async function a(e,t){const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not get URL "+e);return r}async function s(e,t){t.method="POST";const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not post URL "+e);return r}class f{host;headers;account;constructor(e,t){this.host=e+"/testnet",t&&t.headers?this.headers=t.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const t=await a(this.host+e,{headers:this.headers});return await t.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,t,r,n,i,a){if(a=a||[],e<0)throw new Error("Start height must be greater than or equal to 0");const s=new Array;let c,u,l,h,f=0,y=BigInt(0);if(void 0===r){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");l=this.account._privateKey}else try{l=r instanceof o._q?r:o._q.from_string(r)}catch(e){throw new Error("Error parsing private key provided.")}const p=l.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");h=e}catch(e){throw new Error("Error fetching latest block height.")}if(u="number"==typeof t&&t<=h?t:h,e>u)throw new Error("Start height must be less than or equal to end height.");for(;u>e;){c=u-50,c=BigInt(i))))return s;if(void 0!==n&&n.length>0){let e=0;if(t.microcredits()>n[e]){if(e+=1,s.push(t),"number"==typeof i&&(y+=t.microcredits(),y>=BigInt(i)))return s;if(s.length>=n.length)return s}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+c.toString()+"-"+u.toString()),console.warn("Error: ",e),f+=1,f>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),s}}return s}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,t){try{return await this.fetchData("/blocks?start="+e+"&end="+t)}catch(r){throw new Error("Error fetching blocks between "+e+" and "+t+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof o.$r&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const t=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(t)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return o.$r.fromString(e)}catch(t){try{return o.$r.fromString(await this.getProgram(e))}catch(t){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const t={},r=(e instanceof o.$r?e:await this.getProgramObject(e)).getImports();for(let e=0;e0&&!g)try{g=await this.networkClient.getProgramImports(t)}catch(e){throw h(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await o.L.buildExecutionTransaction(w,d,r,a,n,f,this.host,g,y,p,m,b,l)}async execute(e){const t=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(t)}async run(e,t,r,n,i,a,s,c,u,l){let h=u;if(void 0===u&&void 0!==this.account&&(h=this.account.privateKey()),void 0===h)throw"No private key provided and no private key set in the ProgramManager";if(!s||!c)try{[s,c]=await this.keyProvider.functionKeys(a)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",s),console.log("Verifying key: ",c),o.L.executeFunctionOffline(h,e,t,r,n,!1,i,s,c,this.host,l)}async join(e,t,r,n,i,a,s,c){let u,l,f=s;if(void 0===s&&void 0!==this.account&&(f=this.account.privateKey()),void 0===f)throw"No private key provided and no private key set in the ProgramManager";try{u=n?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),l=await this.keyProvider.joinKeys()}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[y,p]=u,[d,g]=l;try{a=n?await this.getCreditsRecord(r,[],a,i):void 0}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof o.PD?e:o.PD.fromString(e),t=t instanceof o.PD?t:o.PD.fromString(t)}catch(e){throw h("Records provided are not valid. Please ensure they are valid plaintext records.")}const v=await o.L.buildJoinTransaction(f,e,t,r,a,this.host,d,g,y,p,c);return await this.networkClient.submitTransaction(v)}async split(e,t,r,n){let i,a=r;if(void 0===a&&void 0!==this.account&&(a=this.account.privateKey()),void 0===a)throw"No private key provided and no private key set in the ProgramManager";try{i=await this.keyProvider.splitKeys()}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[s,c]=i;try{t=t instanceof o.PD?t:o.PD.fromString(t)}catch(e){throw h("Record provided is not valid. Please ensure it is a valid plaintext record.")}const u=await o.L.buildSplitTransaction(a,e,t,this.host,s,c,n);return await this.networkClient.submitTransaction(u)}async synthesizeKeys(e,t,r,n){let i,a=n;void 0===a&&(a=void 0!==this.account?this.account.privateKey():new o._q);try{i=await this.networkClient.getProgramImports(e);const n=await o.L.synthesizeKeyPair(a,e,t,r,i);return[n.provingKey(),n.verifyingKey()]}catch(e){throw h(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,t,r,n,i,a,s,l,f,y){r=u(r);let p,d,g=f;if(void 0===g&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";try{p=i?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),d=await this.keyProvider.transferKeys(r)}catch(e){throw h(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[v,w]=p,[m,b]=d;try{const e=[];c(r)?(s=await this.getCreditsRecord(n,[],s,a),e.push(s.nonce())):s=void 0,l=i?await this.getCreditsRecord(n,e,l,a):void 0}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await o.L.buildTransferTransaction(g,e,t,r,s,n,l,this.host,m,b,v,w,y)}async buildTransferPublicTransaction(e,t,r,n,o){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,o)}async buildTransferPublicAsSignerTransaction(e,t,r,n,o){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,o)}async transfer(e,t,r,n,o,i,a,s,c,u){const l=await this.buildTransferTransaction(e,t,r,n,o,i,a,s,c,u);return await this.networkClient.submitTransaction(l)}async buildBondPublicTransaction(e,t,r,n,o={}){const i=Math.trunc(1e6*n),{programName:a="credits.aleo",functionName:s="bond_public",fee:c=o.fee||.86,privateFee:u=!1,inputs:l=[e,t,r,`${i.toString()}u64`],keySearchParams:h=new y({proverUri:v.bond_public.prover,verifierUri:v.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:f=this.creditsProgram(),...p}=o,d={programName:a,functionName:s,fee:c,privateFee:u,inputs:l,keySearchParams:h,...p};return await this.buildExecutionTransaction(d)}async bondPublic(e,t,r,n,o={}){const i=await this.buildBondPublicTransaction(e,t,r,n,o);return await this.networkClient.submitTransaction(i)}async buildBondValidatorTransaction(e,t,r,n,o={}){const i=Math.trunc(1e6*r),a=Math.trunc(n),{programName:s="credits.aleo",functionName:c="bond_validator",fee:u=o.fee||.86,privateFee:l=!1,inputs:h=[e,t,`${i.toString()}u64`,`${a.toString()}u8`],keySearchParams:f=new y({proverUri:v.bond_validator.prover,verifierUri:v.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:p=this.creditsProgram(),...d}=o,g={programName:s,functionName:c,fee:u,privateFee:l,inputs:h,keySearchParams:f,...d};return await this.buildExecutionTransaction(g)}async bondValidator(e,t,r,n,o={}){const i=await this.buildBondValidatorTransaction(e,t,r,n,o);return await this.networkClient.submitTransaction(i)}async buildUnbondPublicTransaction(e,t,r={}){const n=Math.trunc(1e6*t),{programName:o="credits.aleo",functionName:i="unbond_public",fee:a=r.fee||1.3,privateFee:s=!1,inputs:c=[e,`${n.toString()}u64`],keySearchParams:u=new y({proverUri:v.unbond_public.prover,verifierUri:v.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:l=this.creditsProgram(),...h}=r,f={programName:o,functionName:i,fee:a,privateFee:s,inputs:c,keySearchParams:u,...h};return this.buildExecutionTransaction(f)}async unbondPublic(e,t,r={}){const n=await this.buildUnbondPublicTransaction(e,t,r);return await this.networkClient.submitTransaction(n)}async buildClaimUnbondPublicTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="claim_unbond_public",fee:o=t.fee||2,privateFee:i=!1,inputs:a=[e],keySearchParams:s=new y({proverUri:v.claim_unbond_public.prover,verifierUri:v.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:c=this.creditsProgram(),...u}=t,l={programName:r,functionName:n,fee:o,privateFee:i,inputs:a,keySearchParams:s,...u};return await this.buildExecutionTransaction(l)}async claimUnbondPublic(e,t={}){const r=await this.buildClaimUnbondPublicTransaction(e,t);return await this.networkClient.submitTransaction(r)}async buildSetValidatorStateTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="set_validator_state",fee:o=1,privateFee:i=!1,inputs:a=[e.toString()],keySearchParams:s=new y({proverUri:v.set_validator_state.prover,verifierUri:v.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...c}=t,u={programName:r,functionName:n,fee:o,privateFee:i,inputs:a,keySearchParams:s,...c};return await this.execute(u)}async setValidatorState(e,t={}){const r=await this.buildSetValidatorStateTransaction(e,t);return this.networkClient.submitTransaction(r)}verifyExecution(e){try{const t=e.getExecution(),r=e.getFunctionId(),n=e.getProgram(),i=e.getVerifyingKey();return(0,o.hz)(t,i,n,r)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return o.$r.fromString(e)}creditsProgram(){return o.$r.getCreditsProgram()}verifyProgram(e){try{return o.$r.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,t,r,n){try{return r instanceof o.PD?r:o.PD.fromString(r)}catch(r){try{const r=this.recordProvider;return await r.findCreditsRecord(e,!0,t,n)}catch(e){throw h(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function c(e){return w.has(e)}function u(e){return m.has(e)?e:h(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const g=o.SF.baseUrl();function l(e){const t=o.XV[e.verifyingKey];if(!t)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:t}}const v={bond_public:l(o.SF.bond_public()),bond_validator:l(o.SF.bond_validator()),claim_unbond_public:l(o.SF.claim_unbond_public()),fee_private:l(o.SF.fee_private()),fee_public:l(o.SF.fee_public()),inclusion:l(o.SF.inclusion()),join:l(o.SF.join()),set_validator_state:l(o.SF.set_validator_state()),split:l(o.SF.split()),transfer_private:l(o.SF.transfer_private()),transfer_private_to_public:l(o.SF.transfer_private_to_public()),transfer_public:l(o.SF.transfer_public()),transfer_public_as_signer:l(o.SF.transfer_public_as_signer()),transfer_public_to_private:l(o.SF.transfer_public_to_private()),unbond_public:l(o.SF.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},w=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),m=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),b=new Set(["private","transfer_private","transferPrivate"]),_=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),P=new Set(["public","transfer_public","transferPublic"]),E=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),k=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function h(e){throw console.error(e),e}n()}catch(K){n(K)}}))},5383:(e,t,r)=>{r.a(e,(async(e,t)=>{try{var n=r(5052),o=e([n]);function i(e){return i="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},i(e)}function a(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}function s(e,t){if(e){if("string"==typeof e)return c(e,t);var r=Object.prototype.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?c(e,t):void 0}}function c(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=new Array(t);r=0;--i){var a=this.tryEntries[i],s=a.completion;if("root"===a.tryLoc)return o("end");if(a.tryLoc<=this.prev){var c=n.call(a,"catchLoc"),u=n.call(a,"finallyLoc");if(c&&u){if(this.prev=0;--r){var o=this.tryEntries[r];if(o.tryLoc<=this.prev&&n.call(o,"finallyLoc")&&this.prev=0;--t){var r=this.tryEntries[t];if(r.finallyLoc===e)return this.complete(r.completion,r.afterLoc),N(r),w}},catch:function(e){for(var t=this.tryEntries.length-1;t>=0;--t){var r=this.tryEntries[t];if(r.tryLoc===e){var n=r.completion;if("throw"===n.type){var o=n.arg;N(r)}return o}}throw new Error("illegal catch attempt")},delegateYield:function(t,r,n){return this.delegate={iterator:F(t),resultName:r,nextLoc:n},"next"===this.method&&(this.arg=e),w}},t}function f(e,t,r,n,o,i,a){try{var s=e[i](a),c=s.value}catch(e){return void r(e)}s.done?t(c):Promise.resolve(c).then(n,o)}function y(e){return function(){var t=this,r=arguments;return new Promise((function(n,o){var i=e.apply(t,r);function a(e){f(i,n,o,a,s,"next",e)}function s(e){f(i,n,o,a,s,"throw",e)}a(void 0)}))}}n=(o.then?(await o)():o)[0],await n.initThreadPool();var p="https://api.explorer.aleo.org/v1",d=new n.AleoKeyProvider,g=new n.ProgramManager(p,d,void 0);d.useCache(!0),self.postMessage({type:"ALEO_WORKER_READY"});var v=null;self.addEventListener("message",(function(e){if("ALEO_EXECUTE_PROGRAM_LOCAL"===e.data.type){var t=e.data,r=t.localProgram,o=t.aleoFunction,i=t.inputs,c=t.privateKey;console.log("Web worker: Executing function locally...");var f=performance.now();y(h().mark((function e(){var t,a,s,u,l,y,p,w,m,b;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:if(e.prev=0,t=n.PrivateKey.from_string(c),a=g.createProgramFromSource(r),s=a.id(),a.hasFunction(o)){e.next=6;break}throw"Program ".concat(s," does not contain function ").concat(o);case 6:if(u="".concat(s,":").concat(o),l=g.networkClient.getProgramImports(r),v===r){e.next=14;break}return e.next=11,g.synthesizeKeys(r,o,i,t);case 11:y=e.sent,g.keyProvider.cacheKeys(u,y),v=r;case 14:return p=new n.AleoKeyProviderParams({cacheKey:u}),e.next=17,g.run(r,o,i,!1,l,p,void 0,void 0,t,void 0);case 17:w=e.sent,console.log("Web worker: Local execution completed in ".concat(performance.now()-f," ms")),m=w.getOutputs(),(b=w.getExecution())?(n.verifyFunctionExecution(b,d.getKeys(u)[1],a,"hello"),b=b.toString(),console.log("Execution verified successfully: "+b)):b="",console.log("Function execution response: ".concat(m)),self.postMessage({type:"OFFLINE_EXECUTION_COMPLETED",outputs:{outputs:m,execution:b}}),e.next=30;break;case 26:e.prev=26,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 30:case"end":return e.stop()}}),e,null,[[0,26]])})))()}else if("ALEO_EXECUTE_PROGRAM_ON_CHAIN"===e.data.type){var w=e.data,m=w.remoteProgram,b=w.aleoFunction,_=w.inputs,P=w.privateKey,E=w.fee,k=w.privateFee,K=w.feeRecord,T=w.url;console.log("Web worker: Creating execution...");var S=performance.now();y(h().mark((function e(){var t,r,o,i,a,s,c;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(P),e.next=4,g.networkClient.getProgramObject(m);case 4:if(r=e.sent,o=r.id(),r.hasFunction(b)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(b);case 8:if(i="".concat(o,":").concat(b),g.keyProvider.containsKeys(i)){e.next=15;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(b,"'")),e.next=13,g.synthesizeKeys(m,b,_,t);case 13:a=e.sent,g.keyProvider.cacheKeys(i,a);case 15:return s=new n.AleoKeyProviderParams({cacheKey:i}),"string"==typeof T&&g.setHost(T),e.next=19,g.execute({programName:o,functionName:b,fee:E,privateFee:k,inputs:_,keySearchParams:s,feeRecord:K,privateKey:t});case 19:c=e.sent,console.log("Web worker: On-chain execution transaction created in ".concat(performance.now()-S," ms")),self.postMessage({type:"EXECUTION_TRANSACTION_COMPLETED",executeTransaction:c}),e.next=28;break;case 24:e.prev=24,e.t0=e.catch(0),console.error("Error creating execution transaction: ".concat(e.t0)),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 28:return e.prev=28,g.setHost(p),e.finish(28);case 31:case"end":return e.stop()}}),e,null,[[0,24,28,31]])})))()}else if("ALEO_ESTIMATE_EXECUTION_FEE"===e.data.type){var x=e.data,O=x.remoteProgram,C=x.privateKey,N=x.aleoFunction,R=x.inputs,F=x.url;console.log("Web worker: Estimating execution fee...");var L=performance.now();y(h().mark((function e(){var t,r,o,i,c,f,y,p,d,v,w;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(C),e.next=4,g.networkClient.getProgramObject(O);case 4:if(r=e.sent,o=r.id(),r.getFunctions().includes(N)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(N);case 8:return i="".concat(o,":").concat(N),e.next=11,g.networkClient.getProgramImports(O);case 11:if(c=e.sent,g.keyProvider.containsKeys(i)){e.next=18;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(N,"'")),e.next=16,g.synthesizeKeys(r.toString(),N,R,t);case 16:f=e.sent,g.keyProvider.cacheKeys(i,f);case 18:return y=g.keyProvider.getKeys(i),m=2,p=l(h=y)||u(h,m)||s(h,m)||a(),d=p[0],v=p[1],e.next=21,n.ProgramManagerBase.estimateExecutionFee(t,O,N,R,F,c,d,v,void 0);case 21:w=e.sent,console.log("Web worker: Execution fee estimated in ".concat(performance.now()-L," ms")),console.log("Execution Fee Estimation: ".concat(w," microcredits")),self.postMessage({type:"EXECUTION_FEE_ESTIMATION_COMPLETED",executionFee:Number(w)/1e6+.01}),e.next=31;break;case 27:e.prev=27,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 31:case"end":return e.stop()}var h,m}),e,null,[[0,27]])})))()}else if("ALEO_ESTIMATE_DEPLOYMENT_FEE"===e.data.type){var A=e.data,M=A.program;A.url;console.log("Web worker: Estimating deployment fee...");var I=performance.now();y(h().mark((function e(){var t,r;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,e.next=3,g.networkClient.getProgramImports(M);case 3:return t=e.sent,console.log("Estimating deployment fee.."),e.next=7,n.ProgramManagerBase.estimateDeploymentFee(M,t);case 7:r=e.sent,console.log("Web worker: Deployment fee estimation completed in ".concat(performance.now()-I," ms")),console.log("Deployment Fee Estimation: ".concat(r," microcredits")),self.postMessage({type:"DEPLOYMENT_FEE_ESTIMATION_COMPLETED",deploymentFee:Number(r)/1e6+.01}),e.next=17;break;case 13:e.prev=13,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 17:case"end":return e.stop()}}),e,null,[[0,13]])})))()}else if("ALEO_TRANSFER"===e.data.type){var D=e.data,$=D.privateKey,U=D.amountCredits,B=D.recipient,j=D.transfer_type,W=D.amountRecord,V=D.fee,z=D.privateFee,H=D.feeRecord,X=D.url;console.log("Web worker: Creating transfer of type ".concat(j,"..."));var G=performance.now();y(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof X&&g.setHost(X),e.next=4,g.transfer(U,B,j,V,z,void 0,W,H,n.PrivateKey.from_string($),void 0);case 4:t=e.sent,console.log("Web worker: Transfer transaction ".concat(t," created in ").concat(performance.now()-G," ms")),self.postMessage({type:"TRANSFER_TRANSACTION_COMPLETED",transferTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(p),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_DEPLOY"===e.data.type){var Y=e.data,q=Y.program,J=Y.privateKey,Q=Y.fee,Z=Y.privateFee,ee=Y.feeRecord,te=Y.url;console.log("Web worker: Creating deployment...");var re=performance.now();y(h().mark((function e(){var t,r,o;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof te&&g.setHost(te),t=g.createProgramFromSource(q),r=!1,e.prev=4,e.next=7,g.networkClient.getProgram(t.id());case 7:r=!0,e.next=13;break;case 10:e.prev=10,e.t0=e.catch(4),console.log("Program not found on the Aleo Network - proceeding with deployment...");case 13:if(!r){e.next=15;break}throw"Program ".concat(t.id()," already exists on the network");case 15:return console.log("fee is: ",Q),e.next=18,g.deploy(q,Q,Z,void 0,ee,n.PrivateKey.from_string(J));case 18:o=e.sent,console.log("Web worker: Deployment transaction ".concat(o," created in ").concat(performance.now()-re," ms")),self.postMessage({type:"DEPLOY_TRANSACTION_COMPLETED",deployTransaction:o}),e.next=27;break;case 23:e.prev=23,e.t1=e.catch(0),console.log(e.t1),self.postMessage({type:"ERROR",errorMessage:e.t1.toString()});case 27:return e.prev=27,g.setHost(p),e.finish(27);case 30:case"end":return e.stop()}}),e,null,[[0,23,27,30],[4,10]])})))()}else if("ALEO_SPLIT"===e.data.type){var ne=e.data,oe=ne.splitAmount,ie=ne.record,ae=ne.privateKey,se=ne.url;console.log("Web worker: Creating split...");var ce=performance.now();y(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof se&&g.setHost(se),e.next=4,g.split(oe,ie,n.PrivateKey.from_string(ae),void 0);case 4:t=e.sent,console.log("Web worker: Split transaction ".concat(t," created in ").concat(performance.now()-ce," ms")),self.postMessage({type:"SPLIT_TRANSACTION_COMPLETED",splitTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(p),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_JOIN"===e.data.type){var ue=e.data,le=ue.recordOne,he=ue.recordTwo,fe=ue.fee,ye=ue.privateFee,pe=ue.feeRecord,de=ue.privateKey,ge=ue.url;console.log("Web worker: Creating join...");var ve=performance.now();y(h().mark((function e(){var t;return h().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof ge&&g.setHost(ge),e.next=4,g.join(le,he,fe,ye,void 0,pe,n.PrivateKey.from_string(de),void 0);case 4:t=e.sent,console.log("Web worker: Join transaction ".concat(t," created in ").concat(performance.now()-ve," ms")),self.postMessage({type:"JOIN_TRANSACTION_COMPLETED",joinTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,g.setHost(p),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}})),t()}catch(w){t(w)}}),1)}}]); //# sourceMappingURL=383.bundle.js.map \ No newline at end of file diff --git a/383.bundle.js.map b/383.bundle.js.map index 185ff8bf5..2c92204db 100644 --- a/383.bundle.js.map +++ b/383.bundle.js.map @@ -1 +1 @@ -{"version":3,"file":"383.bundle.js","mappings":";iWAAOA,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,sBAAwBN,GAG9D,OAAOE,CACX,CAGOJ,eAAeS,EAAKP,EAAmBC,GAC1CA,EAAQO,OAAS,OAEjB,MAAMN,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,uBAAyBN,GAG/D,OAAOE,CACX,CCUA,MAAMO,EACJC,KACAC,QACAC,QAEAC,WAAAA,CAAYH,EAAcT,GACxBa,KAAKJ,KAAOA,EAAO,WAEfT,GAAWA,EAAQU,QACrBG,KAAKH,QAAUV,EAAQU,QAGvBG,KAAKH,QAAU,CAEb,qBAAsB,UAa5BI,UAAAA,CAAWH,GACTE,KAAKF,QAAUA,EASjBI,UAAAA,GACE,OAAOF,KAAKF,QASdK,OAAAA,CAAQP,GACNI,KAAKJ,KAAOA,EAAO,WAGrB,eAAMQ,CACFlB,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIe,KAAKJ,KAAOV,EAAK,CAC1CW,QAASG,KAAKH,UAGhB,aAAaT,EAASiB,MACrB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,uBACjB,EA0BH,wBAAMgB,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIjB,MAAM,mDAIlB,MAAMuB,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfZ,EAA4B,CACrC,QAA4B,IAAjBV,KAAKF,QACd,MAAM,IAAIP,MAAM,oGAEhB2B,EAAqBlB,KAAKF,QAAQyB,WAErC,MACC,IACEL,EAAqBR,aAAsBc,EAAAA,GAAad,EAAac,EAAAA,GAAWC,YAAYf,EAC7F,CAAC,MAAOJ,GACP,MAAM,IAAIf,MAAM,sCACjB,CAEH,MAAMmC,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoB5B,KAAK6B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIrC,MAAM,uCAFhB4B,EAAeS,CAIlB,CAAC,MAAOtB,GACP,MAAM,IAAIf,MAAM,sCACjB,CAUD,GANE0B,EADuB,iBAAdR,GAA0BA,GAAaU,EAC1CV,EAEAU,EAIJX,EAAcS,EAChB,MAAM,IAAI1B,MAAM,0DAIlB,KAAO0B,EAAMT,GAAa,CACxBQ,EAAQC,EAAM,GACVD,EAAQR,IACVQ,EAAQR,GAEV,IAEE,MAAMsB,QAAe9B,KAAK+B,cAAcf,EAAOC,GAE/C,GADAA,EAAMD,IACAc,aAAkBvC,OAEtB,IAAK,IAAIyC,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAASC,EAAAA,GAAiBC,WAAWH,EAAOI,OAElD,GAAIH,EAAOI,QAAQzB,GAAU,CAE3B,MAAM0B,EAAkBL,EAAOM,QAAQ3B,GAGjC4B,EAAQF,EAAgBE,QAC9B,GAAIzC,EAAO0C,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBvC,EAAoB,eAAgB,WAE5F,UACQlB,KAAK0D,gBAAgBF,EAC5B,CAAC,MAAOlD,GAEP,IAAKK,IACHG,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQsB,OAAS,EAAG,CAC3D,IAAI4B,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiBjD,EAAQkD,GAAgB,CAIzD,GAHAA,GAAiB,EACjB/C,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQmB,QAAUtB,EAAQsB,OAC5B,OAAOnB,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAOR,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHAwD,QAAQC,KAAK,mCAAqC/C,EAAMgD,WAAa,IAAM/C,EAAI+C,YAC/EF,QAAQC,KAAK,UAAWzD,GACxBc,GAAY,EACRA,EAAW,GAEb,OADA0C,QAAQC,KAAK,0EACNjD,CAEV,CACF,CACD,OAAOA,EAUT,cAAMmD,CAASC,GACb,IAEE,aADoBlE,KAAKI,UAAiB,UAAY8D,EAEvD,CAAC,MAAO5D,GACP,MAAM,IAAIf,MAAM,wBACjB,EAWH,mBAAMwC,CAAcf,EAAeC,GACjC,IACE,aAAajB,KAAKI,UAAwB,iBAAmBY,EAAQ,QAAUC,EAChF,CAAC,MAAOX,GAEP,MAAM,IAAIf,MADW,iCAAmCyB,EAAQ,QAAUC,EAAM,IAEjF,EASH,0CAAMkD,CAAqCxB,GACrCA,aAAmByB,EAAAA,KACrBzB,EAAUA,EAAQqB,YAEpB,IAEE,aADiBhE,KAAKI,UAAkB,kCAAoCuC,IAClE0B,QAAQ,IAAM,GACzB,CAAC,MAAO/D,GACP,MAAM,IAAIf,MAAM,qDACjB,EASH,wCAAM+E,CAAmC3B,GACvC,IACE,MAAM4B,QAA+BvE,KAAKmE,qCAAqCxB,GAC/E,aAA+B3C,KAAKwE,eAAeD,EACpD,CAAC,MAAOjE,GACP,MAAM,IAAIf,MAAM,qDACjB,EASH,oBAAMkF,GACJ,IACE,aAAazE,KAAKI,UAAiB,gBACpC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,EAQH,wBAAMmF,GACJ,IACE,aAAa1E,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,EASH,qBAAMsC,GACJ,IACE,aAAa7B,KAAKI,UAAkB,iBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,gCACjB,EAcH,gBAAMoF,CAAWC,GACf,IACE,aAAa5E,KAAKI,UAAkB,YAAcwE,EACnD,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,yBACjB,EAoBH,sBAAMsF,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnB,WAAW6B,EAC3B,CAAC,MAAOxE,GACP,IACE,OAAO8D,EAAAA,GAAQnB,iBAA0BjD,KAAK2E,WAAWG,GAC1D,CAAC,MAAOxE,GACP,MAAM,IAAIf,MAAM,GAAGuF,iDACpB,CACF,EA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIlD,EAAI,EAAGA,EAAIiD,EAAWhD,OAAQD,IAAK,CAC1C,MAAMmD,EAAYF,EAAWjD,GAC7B,IAAKgD,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8BrF,KAAK2E,WAAWQ,GAC9CG,QAAsCtF,KAAK+E,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAO1E,GACP,MAAMkF,EAAY,mCAAqClF,EACxD,EAcH,2BAAMmF,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IACxFI,YAChB,CAAC,MAAO5E,GACP,MAAM,IAAIf,MAAM,8CAAgDe,EACjE,EAYH,4BAAMoF,CAAuBd,GAC3B,IACE,aAAa5E,KAAKI,UAAyB,YAAcwE,EAAY,YACtE,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,2FACjB,EAiBH,4BAAMoG,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAavF,KAAKI,UAAkB,YAAcwE,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAOjF,GACP,MAAM,IAAIf,MAAM,kFACjB,EASH,kBAAMsG,GACJ,IACE,aAAa7F,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCACjB,EAUH,oBAAMiF,CAAesB,GACnB,IACA,aAAa9F,KAAKI,UAA4B,gBAAkB0F,EAC/D,CAAC,MAAOxF,GACP,MAAM,IAAIf,MAAM,8BACjB,EAUH,qBAAMwG,CAAgB7B,GACpB,IACA,aAAalE,KAAKI,UAAmC,UAAY8D,EAAOF,WAAa,gBACpF,CAAC,MAAO1D,GACP,MAAM,IAAIf,MAAM,+BACjB,EASH,8BAAMyG,GACJ,IACE,aAAahG,KAAKI,UAAmC,2BACtD,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,4CACjB,EAUH,qBAAMmE,CAAgBuC,GACpB,IACE,aAAajG,KAAKI,UAAkB,sBAAwB6F,EAC7D,CAAC,MAAO3F,GACP,MAAM,IAAIf,MAAM,gCACjB,EASH,uBAAM2G,CAAkB5D,GACtB,MAAM6D,EAAqB7D,aAAuB8D,EAAAA,GAAc9D,EAAY0B,WAAa1B,EACzF,IACE,MAAMlD,QAAiBK,EAAKO,KAAKJ,KAAO,yBAA0B,CAChEyG,KAAMF,EACNtG,QAASyG,OAAOC,OAAO,CAAC,EAAGvG,KAAKH,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaT,EAASiB,MAEvB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,qDAAsDe,EAAgBkG,UACvF,CACF,CAAC,MAAOlG,GACP,MAAM,IAAIf,MAAM,oDAAqDe,EAAgBkG,UACtF,GCjnBL,MAAMC,EACFC,KACAC,UACAC,YACAC,SAUA9G,WAAAA,CAAY+G,GACR9G,KAAK2G,UAAYG,EAAOH,UACxB3G,KAAK4G,YAAcE,EAAOF,YAC1B5G,KAAK6G,SAAWC,EAAOD,SACvB7G,KAAK0G,KAAOI,EAAOJ,MAyK3B,MAAMK,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFjI,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBkI,QAAahI,EAASiI,cAC5B,OAAO,IAAIC,WAAWF,EACrB,CAAC,MAAO9G,GACL,MAAM,IAAIf,MAAM,uBAAyBe,EAC5C,EAGLP,WAAAA,GACIC,KAAKkH,QAAUK,EACfvH,KAAKgH,MAAQ,IAAIQ,IACjBxH,KAAKiH,aAAc,EAQvBQ,QAAAA,CAASA,GACLzH,KAAKiH,YAAcQ,EAMvBC,UAAAA,GACI1H,KAAKgH,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC9H,KAAKgH,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAO7H,KAAKgH,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAO7H,KAAKgH,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/D,QAAQ0E,MAAM,2CAA2CX,KACrD7H,KAAKgH,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC1I,KAAKgH,MAAM/H,IAAI4I,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAInJ,MAAM,2BAwBzB,kBAAMuJ,CAAahC,GACf,GAAIA,EAAQ,CACR,IAAIiC,EACAC,EACAnC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIvB,EAAM0D,EAAqBC,OAAOpC,EAAa,MACnD,KAAMvB,aAAehG,OACjB,OAAOS,KAAKmJ,iBAAiB5D,EAEpC,CAcD,GAZI,cAAeuB,GAAwC,iBAAvBA,EAAkB,YAClDiC,EAAYjC,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDkC,EAAclC,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5BiC,GAAaC,EACb,aAAahJ,KAAKoJ,gBAAgBL,EAAWC,EAAanC,GAG9D,GAAIA,EACA,OAAO7G,KAAKuI,QAAQ1B,EAE3B,CACD,MAAMtH,MAAM,oGA4BhB,qBAAM6J,CAAgBL,EAAmBC,EAAqBnC,GAC1D,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,MAAO,CAACyF,EAAAA,GAAWC,UAAU1F,EAAM,IAAK2F,EAAAA,GAAaD,UAAU1F,EAAM,KAClE,CACHY,QAAQ0E,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAC1EjF,QAAQ0E,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoChI,KAAKqJ,gBAAgBL,GAE/D,OADAhJ,KAAKgH,MAAMiB,IAAIpB,EAAU,CAACkB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAE1E,MAAO,CAAChB,QADkC/H,KAAKqJ,gBAAgBL,GAElE,CACJ,CAAC,MAAO1I,GACL,MAAM,IAAIf,MAAgB,UAAAe,kDAAsDyI,SAAiBC,KACpG,EAWL,qBAAMM,CAAgBP,EAAmBlC,GACrC,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,OAAOyF,EAAAA,GAAWC,UAAU1F,EAAM,IAElCY,QAAQ0E,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAAC,MAAOzI,GACL,MAAM,IAAIf,MAAM,UAAUe,oCAAwCyI,IACrE,EAGL,sBAAMI,CAAiB5D,GACnB,IACI,GAAKvF,KAAKgH,MAAMoB,IAAI7C,EAAIgE,UAAavJ,KAAKiH,YAOnC,CACH,MAAMuC,EAAyBxJ,KAAKgH,MAAM/H,IAAIsG,EAAIgE,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgBlE,EAAIyC,eACpB0B,QAAgC1J,KAAKsJ,gBAAgB/D,EAAIoE,OAAQpE,EAAIgE,SAI3E,OAHIvJ,KAAKiH,aACLjH,KAAKgH,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAOnJ,GACL,MAAM,IAAIf,MAAM,sCAAsCe,IACzD,EAGL,oBAAMuJ,GACF,OAAO7J,KAAKmJ,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO9J,KAAKmJ,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOhK,KAAKmJ,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanK,KAAKmJ,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanK,KAAKmJ,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanK,KAAKmJ,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAItL,MAAM,2BASxB,cAAMuL,GACF,aAAa9K,KAAKmJ,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAahL,KAAKmJ,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAalL,KAAKmJ,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAapL,KAAKmJ,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBzC,GAClB,OAAQA,GACJ,KAAKqC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM5I,QAAiBH,EAAI2H,GACrB8E,QAAatM,EAASsM,OAC5B,OAAqB7C,EAAAA,GAAa5F,WAAWyI,EAChD,CAAC,MAAOC,GAEL,IACA,OAAqB9C,EAAAA,GAAaD,gBAAgB5I,KAAKmH,WAAWP,GACjE,CAAC,MAAOgF,GACL,OAAO,IAAIrM,MAAM,iCAAmCqM,EACvD,CACJ,GAIbC,gBAAAA,GACI,OAAO7L,KAAKmJ,iBAAiBF,EAAqBwC,gBC/hB1D,MAAMK,EACFhM,QACAiM,YACAnM,KACAoM,cACAC,eAQAlM,WAAAA,CAAYH,EAA2BmM,EAA+CE,GAClFjM,KAAKJ,KAAOA,GAAc,mCAC1BI,KAAKgM,cAAgB,IAAIrM,EAAkBK,KAAKJ,MAEhDI,KAAK+L,YAAcA,GAA4B,IAAIhF,EACnD/G,KAAKiM,eAAiBA,EAQ1BhM,UAAAA,CAAWH,GACPE,KAAKF,QAAUA,EAQnBoM,cAAAA,CAAeH,GACX/L,KAAK+L,YAAcA,EAQvB5L,OAAAA,CAAQP,GACJI,KAAKJ,KAAOA,EACZI,KAAKgM,cAAc7L,QAAQP,GAQ/BuM,iBAAAA,CAAkBF,GACdjM,KAAKiM,eAAiBA,EAkC1B,YAAMG,CACFzJ,EACA0J,EACAC,EACAC,EACAC,EACA9L,GAGA,IACI,MAAM+L,EAAgBrI,EAAAA,GAAQnB,WAAWN,GACzC,IAAI0C,EACJ,IACIA,QAAsBrF,KAAKgM,cAAcrH,WAAW8H,EAAc3G,KACrE,CAAC,MAAO6F,GAEL7H,QAAQ4I,IAAe,WAAAD,EAAc3G,mDACxC,CACD,GAA4B,iBAAjBT,EACP,KAAO,WAAWoH,EAAc3G,gEAEvC,CAAC,MAAO6F,GACL,MAAMnG,EAAY,6BAA6BmG,IAClD,CAGD,IAiBIgB,EAjBAC,EAAuBlM,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD8M,EAAuB5M,KAAKF,QAAQY,mBAGJ,IAAzBkM,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAI3H,EACJ,IACIA,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,EACxD,CAAC,MAAOgJ,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAGD,MAAMsB,QAAWC,EAAAA,EAAmBC,2BAA2BP,EAAsBjK,EAAS0J,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+H,EAAeC,GACjJ,aAAahN,KAAKgM,cAAc9F,kBAAkB+G,GA8BtD,+BAAMG,CAA0BjO,GAE5B,MAAM,YACFkO,EAAW,aACXC,EAAY,IACZjB,EAAG,WACHC,EAAU,OACViB,EAAM,mBACNhB,EAAkB,gBAClBiB,EAAe,WACf9M,EAAU,aACV+M,GACAtO,EAEJ,IAAIqN,EAAYrN,EAAQqN,UACpBzE,EAAa5I,EAAQ4I,WACrBC,EAAe7I,EAAQ6I,aACvBrF,EAAUxD,EAAQwD,QAClBqC,EAAU7F,EAAQ6F,QAGtB,QAAgB8H,IAAZnK,EACA,IACIA,QAAyB3C,KAAKgM,cAAcrH,WAAW0I,EAC1D,CAAC,MAAO1B,GACL,MAAMnG,EAA6B,iBAAA6H,yBAAmC1B,qGACzE,MACMhJ,aAAmByB,EAAAA,KAC1BzB,EAAUA,EAAQqB,YAItB,IAiBI2I,EAjBAe,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IACIlB,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAK5E,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAKL,GADwBvH,EAAAA,GAAQnB,WAAWN,GAASuC,aAAajD,OAC3C,IAAM+C,EACxB,IACIA,QAAgChF,KAAKgM,cAAcjH,kBAAkBsI,EACxE,CAAC,MAAO1B,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAIL,aAAauB,EAAAA,EAAmBE,0BAA0BM,EAAqB/K,EAAS2K,EAAcC,EAAQlB,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+C,EAAYC,EAAc+E,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQxO,GACV,MAAM8N,QAAwBjN,KAAKoN,0BAA0BjO,GAC7D,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAoCtD,SAAMW,CACFjL,EACAkL,EACAN,EACAO,EACA9I,EACAwI,EACAzF,EACAC,EACAtH,EACA+M,GAGA,IAAIC,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IAAK3F,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAOL,OAHA7H,QAAQ4I,IAAI,2BACZ5I,QAAQ4I,IAAI,gBAAiB3E,GAC7BjE,QAAQ4I,IAAI,kBAAmB1E,GACxBkF,EAAAA,EAAmBa,uBAAuBL,EAAqB/K,EAASkL,EAAeN,EAAQO,GAAgB,EAAO9I,EAAS+C,EAAYC,EAAchI,KAAKJ,KAAM6N,GAiB/K,UAAM1C,CACFiD,EACAC,EACA5B,EACAC,EACAC,EACAC,EACA9L,EACA+M,GAGA,IAUId,EACA7B,EAXA4C,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HN,QAAkC9K,KAAK+L,YAAYjB,UACtD,CAAC,MAAOa,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCuB,EAAgBC,GAAoBrD,EAG3C,IACI0B,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,IACIqC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBnL,WAAW+K,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBnL,WAAWgL,EAC7F,CAAC,MAAOtC,GACL,MAAMnG,EAAY,kFACrB,CAGD,MAAMyH,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW5B,EAAKG,EAAWxM,KAAKJ,KAAMsO,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,WAAMhC,CAAMqD,EAAqBC,EAAwC7N,EAAyB+M,GAE9F,IAUIzC,EAVA0C,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAKV,IACI1C,QAAmChL,KAAK+L,YAAYf,WACvD,CAAC,MAAOW,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAO6C,EAAiBC,GAAqBzD,EAG7C,IACIuD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBnL,WAAWsL,EACtG,CAAC,MAAO5C,GACL,MAAMnG,EAAY,8EACrB,CAGD,MAAMyH,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcvO,KAAKJ,KAAM4O,EAAiBC,EAAmBhB,GACzJ,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAatD,oBAAM0B,CACFhM,EACAiM,EACArB,EACA7M,GAGA,IAAIsE,EAEA0I,EAAsBhN,OACS,IAAxBgN,IAEHA,OADwB,IAAjB1N,KAAKF,QACUE,KAAKF,QAAQY,aAEb,IAAIc,EAAAA,IAKlC,IACIwD,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACrD,MAAM6G,QAAgB0D,EAAAA,EAAmB2B,kBACrCnB,EACA/K,EACAiM,EACArB,EACAvI,GAEJ,MAAO,CAAawE,EAAQzB,aAA4ByB,EAAQxB,eACnE,CAAC,MAAO2D,GACL,MAAMnG,EAAY,qCAAqCmG,oEAC1D,EAgCL,8BAAMmD,CACFC,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUItC,EACAzC,EAXAwD,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HlB,QAAsClK,KAAK+L,YAAY7B,aAAa+E,EACvE,CAAC,MAAOtD,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCwC,EAAoBC,GAAwBlF,EAGnD,IAEI,MAAMrJ,EAAmB,GACrBwO,EAAqBJ,IAErBV,QAAsCvO,KAAK6M,iBAAiBR,EAAK,GAAIkC,EAAchC,GACnF1L,EAAO8C,KAAK4K,EAAajL,UAEzBiL,OAAezB,EAEnBN,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAKxL,EAAQ2L,EAAWD,QAAsBO,CACvH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,aAAauB,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAclC,EAAKG,EAAWxM,KAAKJ,KAAMuP,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GAmB/H,4CAAM8B,CACFR,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAEA,MAAMR,QAAwBjN,KAAK8O,yBAAyBC,EAAQC,EAAWC,EAAc5C,EAAKC,EAAYC,EAAoBgC,EAAc/B,EAAW9L,EAAY+M,GACvK,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB5P,EAAmC,CAAC,GAChK,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa7L,iBAAgB,gBACjGwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBW,YAAYD,OAC5C/C,YAAaqC,EAAqBW,YAAY0B,SAC9CzE,SAAU,6BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB5P,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKyP,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ5P,GAC7H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/J,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa7L,gBAAiB,GAAGsM,EAAmBtM,gBAAe,gBACvHwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBc,eAAeJ,OAC/C/C,YAAaqC,EAAqBc,eAAeuB,SACjDzE,SAAU,gCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKoQ,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYlR,GAC5H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3G,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BjB,EAAMlN,EAAQkN,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgB,GAAGG,EAAa7L,iBAAgB,gBAC1DwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBwC,cAAc9B,OAC9C/C,YAAaqC,EAAqBwC,cAAcH,SAChDzE,SAAU,+BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,OAAOjQ,KAAKoN,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3F,MAAM8N,QAAwBjN,KAAKwQ,6BAA6Bd,EAAgBX,EAAQ5P,GACxF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,uCAAMyD,CAAkChB,EAAwBvQ,EAAmC,CAAC,GAChG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAMlN,EAAQkN,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBgB,oBAAoBN,OACpD/C,YAAaqC,EAAqBgB,oBAAoBqB,SACtDzE,SAAU,qCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwBvQ,EAAmC,CAAC,GAChF,MAAM8N,QAAwBjN,KAAK0Q,kCAAkChB,EAAgBvQ,GACrF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,uCAAM2D,CAAkCC,EAA0B1R,EAAmC,CAAC,GAClG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBiB,EAAS,CAACsD,EAAgB7M,YAAW,gBACrCwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBuC,oBAAoB7B,OACpD/C,YAAaqC,EAAqBuC,oBAAoBF,SACtDzE,SAAU,wCAEXoJ,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAK2N,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B1R,EAAmC,CAAC,GAClF,MAAM8N,QAAmBjN,KAAK4Q,kCAAkCC,EAAiB1R,GACjF,OAAOa,KAAKgM,cAAc9F,kBAAkB+G,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMzO,EAAuByO,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCvO,EAAUqO,EAAkBrM,aAC5BqD,EAAegJ,EAAkB3H,kBACvC,OAAO8H,EAAAA,EAAAA,IAAwB5O,EAAWyF,EAAcrF,EAASiM,EACpE,CAAC,MAAMjD,GAEJ,OADA7H,QAAQC,KAAK,6EACN,CACV,EASLqN,uBAAAA,CAAwBzO,GACpB,OAAOyB,EAAAA,GAAQnB,WAAWN,GAQ9BqN,cAAAA,GACI,OAAO5L,EAAAA,GAAQiN,oBAQnBC,aAAAA,CAAc3O,GACV,IAEI,OADSyB,EAAAA,GAAQnB,WAAWN,IACrB,CACV,CAAC,MAAOgJ,GACL,OAAO,CACV,EAIL,sBAAMkB,CAAiBkC,EAAgBlO,EAAkBkC,EAAmC+D,GACxF,IACI,OAAO/D,aAAkBqL,EAAAA,GAAkBrL,EAASqL,EAAAA,GAAgBnL,WAAmBF,EAC1F,CAAC,MAAO4I,GACL,IACI,MAAMM,EAAiCjM,KAAKiM,eAC5C,aAA+BA,EAAesF,kBAAkBxC,GAAQ,EAAMlO,EAAQiG,EACzF,CAAC,MAAO6E,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CACJ,GAKT,SAAS0D,EAAqBJ,GAC1B,OAAOuC,EAAuBpJ,IAAI6G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOwC,EAAqBrJ,IAAI6G,GAAgBA,EAC5CzJ,EAAY,0BAA0ByJ,8FAC9C,CCjwCA,MAAM1H,EAAYmK,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAM7J,EAAgBa,EAAAA,GAAqBgJ,EAAS7J,cAEpD,IAAKA,EACD,MAAM,IAAIzI,MAAM,wBAA0BsS,EAAS7J,cAGvD,MAAO,CACHtB,KAAMmL,EAASnL,KACf6C,QAASsI,EAAStI,QAClBI,OAAQkI,EAASlI,OACjB2B,SAAUuG,EAASvG,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAagI,EAAQF,EAAAA,GAAS9H,eAC9BG,eAAgB6H,EAAQF,EAAAA,GAAS3H,kBACjCE,oBAAqB2H,EAAQF,EAAAA,GAASzH,uBACtCkB,YAAayG,EAAQF,EAAAA,GAASvG,eAC9BE,WAAYuG,EAAQF,EAAAA,GAASrG,cAC7BE,UAAWqG,EAAQF,EAAAA,GAASnG,aAC5BR,KAAM6G,EAAQF,EAAAA,GAAS3G,QACvBS,oBAAqBoG,EAAQF,EAAAA,GAASlG,uBACtCP,MAAO2G,EAAQF,EAAAA,GAASzG,SACxBZ,iBAAkBuH,EAAQF,EAAAA,GAASrH,oBACnCE,2BAA4BqH,EAAQF,EAAAA,GAASnH,8BAC7CE,gBAAiBmH,EAAQF,EAAAA,GAASjH,mBAClCE,0BAA2BiH,EAAQF,EAAAA,GAAS/G,6BAC5CE,2BAA4B+G,EAAQF,EAAAA,GAAS7G,8BAC7CY,cAAemG,EAAQF,EAAAA,GAASjG,iBAChCvC,OAAQ,SAAS3D,GACb,OAAIvF,KAAKoF,eAAeG,GACZvF,KAAauF,GAEd,IAAIhG,MAAM,QAAQgG,mBAK/BiM,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE1H,EAAmB,IAAI0H,IAAI,CAC7B,UACA,mBACA,oBAEExH,EAA6B,IAAIwH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEtH,EAAkB,IAAIsH,IAAI,CAC5B,SACA,kBACA,mBAEEpH,EAA4B,IAAIoH,IAAI,CACtC,mBACA,4BACA,2BAEElH,EAA6B,IAAIkH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAStM,EAAYgB,GAEjB,MADA1C,QAAQxD,MAAMkG,GACRA,CACV,szCC9GAuL,EAAA,kBAAApG,CAAA,MAAAqG,EAAArG,EAAA,GAAAsG,EAAA3L,OAAA4L,UAAAC,EAAAF,EAAA7M,eAAAgN,EAAA9L,OAAA+L,gBAAA,SAAAL,EAAArG,EAAAsG,GAAAD,EAAArG,GAAAsG,EAAA/O,KAAA,EAAAlB,EAAA,mBAAAsQ,OAAAA,OAAA,GAAAC,EAAAvQ,EAAAwQ,UAAA,aAAAC,EAAAzQ,EAAA0Q,eAAA,kBAAAC,EAAA3Q,EAAA4Q,aAAA,yBAAAC,EAAAb,EAAArG,EAAAsG,GAAA,OAAA3L,OAAA+L,eAAAL,EAAArG,EAAA,CAAAzI,MAAA+O,EAAAa,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAAhB,EAAArG,EAAA,KAAAkH,EAAA,aAAAb,GAAAa,EAAA,SAAAb,EAAArG,EAAAsG,GAAA,OAAAD,EAAArG,GAAAsG,CAAA,WAAAgB,EAAAjB,EAAArG,EAAAsG,EAAAE,GAAA,IAAAnQ,EAAA2J,GAAAA,EAAAuG,qBAAAgB,EAAAvH,EAAAuH,EAAAX,EAAAjM,OAAA6M,OAAAnR,EAAAkQ,WAAAO,EAAA,IAAAW,EAAAjB,GAAA,WAAAC,EAAAG,EAAA,WAAArP,MAAAmQ,EAAArB,EAAAC,EAAAQ,KAAAF,CAAA,UAAAe,EAAAtB,EAAArG,EAAAsG,GAAA,WAAA5P,KAAA,SAAAkR,IAAAvB,EAAAwB,KAAA7H,EAAAsG,GAAA,OAAAD,GAAA,OAAA3P,KAAA,QAAAkR,IAAAvB,EAAA,EAAArG,EAAAsH,KAAAA,EAAA,IAAAQ,EAAA,iBAAA5Q,EAAA,iBAAA6Q,EAAA,YAAAC,EAAA,YAAAC,EAAA,YAAAV,IAAA,UAAAW,IAAA,UAAAC,IAAA,KAAAC,EAAA,GAAAlB,EAAAkB,EAAAxB,GAAA,8BAAAyB,EAAA1N,OAAA2N,eAAAC,EAAAF,GAAAA,EAAAA,EAAAG,EAAA,MAAAD,GAAAA,IAAAjC,GAAAE,EAAAqB,KAAAU,EAAA3B,KAAAwB,EAAAG,GAAA,IAAAE,EAAAN,EAAA5B,UAAAgB,EAAAhB,UAAA5L,OAAA6M,OAAAY,GAAA,SAAAM,EAAArC,GAAA,0BAAAsC,SAAA,SAAA3I,GAAAkH,EAAAb,EAAArG,GAAA,SAAAqG,GAAA,YAAAuC,QAAA5I,EAAAqG,EAAA,gBAAAwC,EAAAxC,EAAArG,GAAA,SAAA8I,EAAAxC,EAAAG,EAAApQ,EAAAuQ,GAAA,IAAAE,EAAAa,EAAAtB,EAAAC,GAAAD,EAAAI,GAAA,aAAAK,EAAApQ,KAAA,KAAAsQ,EAAAF,EAAAc,IAAAE,EAAAd,EAAAzP,MAAA,OAAAuQ,GAAA,UAAAiB,EAAAjB,IAAAtB,EAAAqB,KAAAC,EAAA,WAAA9H,EAAAgJ,QAAAlB,EAAAmB,SAAAC,MAAA,SAAA7C,GAAAyC,EAAA,OAAAzC,EAAAhQ,EAAAuQ,EAAA,aAAAP,GAAAyC,EAAA,QAAAzC,EAAAhQ,EAAAuQ,EAAA,IAAA5G,EAAAgJ,QAAAlB,GAAAoB,MAAA,SAAA7C,GAAAW,EAAAzP,MAAA8O,EAAAhQ,EAAA2Q,EAAA,aAAAX,GAAA,OAAAyC,EAAA,QAAAzC,EAAAhQ,EAAAuQ,EAAA,IAAAA,EAAAE,EAAAc,IAAA,KAAAtB,EAAAG,EAAA,gBAAAlP,MAAA,SAAA8O,EAAAG,GAAA,SAAA2C,IAAA,WAAAnJ,GAAA,SAAAA,EAAAsG,GAAAwC,EAAAzC,EAAAG,EAAAxG,EAAAsG,EAAA,WAAAA,EAAAA,EAAAA,EAAA4C,KAAAC,EAAAA,GAAAA,GAAA,aAAAzB,EAAA1H,EAAAsG,EAAAE,GAAA,IAAAC,EAAAqB,EAAA,gBAAAzR,EAAAuQ,GAAA,GAAAH,IAAAsB,EAAA,UAAAnU,MAAA,mCAAA6S,IAAAuB,EAAA,cAAA3R,EAAA,MAAAuQ,EAAA,OAAArP,MAAA8O,EAAA+C,MAAA,OAAA5C,EAAAzS,OAAAsC,EAAAmQ,EAAAoB,IAAAhB,IAAA,KAAAE,EAAAN,EAAA6C,SAAA,GAAAvC,EAAA,KAAAE,EAAAsC,EAAAxC,EAAAN,GAAA,GAAAQ,EAAA,IAAAA,IAAAiB,EAAA,gBAAAjB,CAAA,cAAAR,EAAAzS,OAAAyS,EAAA+C,KAAA/C,EAAAgD,MAAAhD,EAAAoB,SAAA,aAAApB,EAAAzS,OAAA,IAAA0S,IAAAqB,EAAA,MAAArB,EAAAuB,EAAAxB,EAAAoB,IAAApB,EAAAiD,kBAAAjD,EAAAoB,IAAA,gBAAApB,EAAAzS,QAAAyS,EAAAkD,OAAA,SAAAlD,EAAAoB,KAAAnB,EAAAsB,EAAA,IAAAK,EAAAT,EAAA3H,EAAAsG,EAAAE,GAAA,cAAA4B,EAAA1R,KAAA,IAAA+P,EAAAD,EAAA4C,KAAApB,EAAA9Q,EAAAkR,EAAAR,MAAAK,EAAA,gBAAA1Q,MAAA6Q,EAAAR,IAAAwB,KAAA5C,EAAA4C,KAAA,WAAAhB,EAAA1R,OAAA+P,EAAAuB,EAAAxB,EAAAzS,OAAA,QAAAyS,EAAAoB,IAAAQ,EAAAR,IAAA,YAAA0B,EAAAtJ,EAAAsG,GAAA,IAAAE,EAAAF,EAAAvS,OAAA0S,EAAAzG,EAAA6G,SAAAL,GAAA,GAAAC,IAAAJ,EAAA,OAAAC,EAAA+C,SAAA,eAAA7C,GAAAxG,EAAA6G,SAAA,SAAAP,EAAAvS,OAAA,SAAAuS,EAAAsB,IAAAvB,EAAAiD,EAAAtJ,EAAAsG,GAAA,UAAAA,EAAAvS,SAAA,WAAAyS,IAAAF,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAA,IAAA+B,UAAA,oCAAAnD,EAAA,aAAAyB,EAAA,IAAA5R,EAAAsR,EAAAlB,EAAAzG,EAAA6G,SAAAP,EAAAsB,KAAA,aAAAvR,EAAAK,KAAA,OAAA4P,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAAvR,EAAAuR,IAAAtB,EAAA+C,SAAA,KAAApB,EAAA,IAAArB,EAAAvQ,EAAAuR,IAAA,OAAAhB,EAAAA,EAAAwC,MAAA9C,EAAAtG,EAAA4J,YAAAhD,EAAArP,MAAA+O,EAAAuD,KAAA7J,EAAA8J,QAAA,WAAAxD,EAAAvS,SAAAuS,EAAAvS,OAAA,OAAAuS,EAAAsB,IAAAvB,GAAAC,EAAA+C,SAAA,KAAApB,GAAArB,GAAAN,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAA,IAAA+B,UAAA,oCAAArD,EAAA+C,SAAA,KAAApB,EAAA,UAAA8B,EAAA1D,GAAA,IAAArG,EAAA,CAAAgK,OAAA3D,EAAA,SAAAA,IAAArG,EAAAiK,SAAA5D,EAAA,SAAAA,IAAArG,EAAAkK,WAAA7D,EAAA,GAAArG,EAAAmK,SAAA9D,EAAA,SAAA+D,WAAApS,KAAAgI,EAAA,UAAAqK,EAAAhE,GAAA,IAAArG,EAAAqG,EAAAiE,YAAA,GAAAtK,EAAAtJ,KAAA,gBAAAsJ,EAAA4H,IAAAvB,EAAAiE,WAAAtK,CAAA,UAAAyH,EAAApB,GAAA,KAAA+D,WAAA,EAAAJ,OAAA,SAAA3D,EAAAsC,QAAAoB,EAAA,WAAAQ,OAAA,YAAA/B,EAAAxI,GAAA,GAAAA,GAAA,KAAAA,EAAA,KAAAsG,EAAAtG,EAAA4G,GAAA,GAAAN,EAAA,OAAAA,EAAAuB,KAAA7H,GAAA,sBAAAA,EAAA6J,KAAA,OAAA7J,EAAA,IAAAwK,MAAAxK,EAAA1J,QAAA,KAAAmQ,GAAA,EAAApQ,EAAA,SAAAwT,IAAA,OAAApD,EAAAzG,EAAA1J,QAAA,GAAAkQ,EAAAqB,KAAA7H,EAAAyG,GAAA,OAAAoD,EAAAtS,MAAAyI,EAAAyG,GAAAoD,EAAAT,MAAA,EAAAS,EAAA,OAAAA,EAAAtS,MAAA8O,EAAAwD,EAAAT,MAAA,EAAAS,CAAA,SAAAxT,EAAAwT,KAAAxT,CAAA,YAAAsT,UAAAZ,EAAA/I,GAAA,2BAAAkI,EAAA3B,UAAA4B,EAAA1B,EAAAgC,EAAA,eAAAlR,MAAA4Q,EAAAf,cAAA,IAAAX,EAAA0B,EAAA,eAAA5Q,MAAA2Q,EAAAd,cAAA,IAAAc,EAAAuC,YAAAvD,EAAAiB,EAAAnB,EAAA,qBAAAhH,EAAA0K,oBAAA,SAAArE,GAAA,IAAArG,EAAA,mBAAAqG,GAAAA,EAAAjS,YAAA,QAAA4L,IAAAA,IAAAkI,GAAA,uBAAAlI,EAAAyK,aAAAzK,EAAAjF,MAAA,EAAAiF,EAAA2K,KAAA,SAAAtE,GAAA,OAAA1L,OAAAiQ,eAAAjQ,OAAAiQ,eAAAvE,EAAA8B,IAAA9B,EAAAwE,UAAA1C,EAAAjB,EAAAb,EAAAW,EAAA,sBAAAX,EAAAE,UAAA5L,OAAA6M,OAAAiB,GAAApC,CAAA,EAAArG,EAAA8K,MAAA,SAAAzE,GAAA,OAAA4C,QAAA5C,EAAA,EAAAqC,EAAAG,EAAAtC,WAAAW,EAAA2B,EAAAtC,UAAAO,GAAA,0BAAA9G,EAAA6I,cAAAA,EAAA7I,EAAA3M,MAAA,SAAAgT,EAAAC,EAAAE,EAAAC,EAAApQ,QAAA,IAAAA,IAAAA,EAAA0U,SAAA,IAAAnE,EAAA,IAAAiC,EAAAvB,EAAAjB,EAAAC,EAAAE,EAAAC,GAAApQ,GAAA,OAAA2J,EAAA0K,oBAAApE,GAAAM,EAAAA,EAAAiD,OAAAX,MAAA,SAAA7C,GAAA,OAAAA,EAAA+C,KAAA/C,EAAA9O,MAAAqP,EAAAiD,MAAA,KAAAnB,EAAAD,GAAAvB,EAAAuB,EAAAzB,EAAA,aAAAE,EAAAuB,EAAA7B,GAAA,0BAAAM,EAAAuB,EAAA,qDAAAzI,EAAA7D,KAAA,SAAAkK,GAAA,IAAArG,EAAArF,OAAA0L,GAAAC,EAAA,WAAAE,KAAAxG,EAAAsG,EAAAtO,KAAAwO,GAAA,OAAAF,EAAA0E,UAAA,SAAAnB,IAAA,KAAAvD,EAAAhQ,QAAA,KAAA+P,EAAAC,EAAA2E,MAAA,GAAA5E,KAAArG,EAAA,OAAA6J,EAAAtS,MAAA8O,EAAAwD,EAAAT,MAAA,EAAAS,CAAA,QAAAA,EAAAT,MAAA,EAAAS,CAAA,GAAA7J,EAAAwI,OAAAA,EAAAf,EAAAlB,UAAA,CAAAnS,YAAAqT,EAAA8C,MAAA,SAAAvK,GAAA,QAAAkL,KAAA,OAAArB,KAAA,OAAAN,KAAA,KAAAC,MAAAnD,EAAA,KAAA+C,MAAA,OAAAC,SAAA,UAAAtV,OAAA,YAAA6T,IAAAvB,EAAA,KAAA+D,WAAAzB,QAAA0B,IAAArK,EAAA,QAAAsG,KAAA,WAAAA,EAAA6E,OAAA,IAAA3E,EAAAqB,KAAA,KAAAvB,KAAAkE,OAAAlE,EAAA8E,MAAA,WAAA9E,GAAAD,EAAA,EAAAgF,KAAA,gBAAAjC,MAAA,MAAA/C,EAAA,KAAA+D,WAAA,GAAAE,WAAA,aAAAjE,EAAA3P,KAAA,MAAA2P,EAAAuB,IAAA,YAAA0D,IAAA,EAAA7B,kBAAA,SAAAzJ,GAAA,QAAAoJ,KAAA,MAAApJ,EAAA,IAAAsG,EAAA,cAAAiF,EAAA/E,EAAAC,GAAA,OAAAG,EAAAlQ,KAAA,QAAAkQ,EAAAgB,IAAA5H,EAAAsG,EAAAuD,KAAArD,EAAAC,IAAAH,EAAAvS,OAAA,OAAAuS,EAAAsB,IAAAvB,KAAAI,CAAA,SAAAA,EAAA,KAAA2D,WAAA9T,OAAA,EAAAmQ,GAAA,IAAAA,EAAA,KAAApQ,EAAA,KAAA+T,WAAA3D,GAAAG,EAAAvQ,EAAAiU,WAAA,YAAAjU,EAAA2T,OAAA,OAAAuB,EAAA,UAAAlV,EAAA2T,QAAA,KAAAkB,KAAA,KAAApE,EAAAN,EAAAqB,KAAAxR,EAAA,YAAA2Q,EAAAR,EAAAqB,KAAAxR,EAAA,iBAAAyQ,GAAAE,EAAA,SAAAkE,KAAA7U,EAAA4T,SAAA,OAAAsB,EAAAlV,EAAA4T,UAAA,WAAAiB,KAAA7U,EAAA6T,WAAA,OAAAqB,EAAAlV,EAAA6T,WAAA,SAAApD,GAAA,QAAAoE,KAAA7U,EAAA4T,SAAA,OAAAsB,EAAAlV,EAAA4T,UAAA,YAAAjD,EAAA,UAAApT,MAAA,kDAAAsX,KAAA7U,EAAA6T,WAAA,OAAAqB,EAAAlV,EAAA6T,WAAA,KAAAR,OAAA,SAAArD,EAAArG,GAAA,QAAAsG,EAAA,KAAA8D,WAAA9T,OAAA,EAAAgQ,GAAA,IAAAA,EAAA,KAAAG,EAAA,KAAA2D,WAAA9D,GAAA,GAAAG,EAAAuD,QAAA,KAAAkB,MAAA1E,EAAAqB,KAAApB,EAAA,oBAAAyE,KAAAzE,EAAAyD,WAAA,KAAA7T,EAAAoQ,EAAA,OAAApQ,IAAA,UAAAgQ,GAAA,aAAAA,IAAAhQ,EAAA2T,QAAAhK,GAAAA,GAAA3J,EAAA6T,aAAA7T,EAAA,UAAAuQ,EAAAvQ,EAAAA,EAAAiU,WAAA,UAAA1D,EAAAlQ,KAAA2P,EAAAO,EAAAgB,IAAA5H,EAAA3J,GAAA,KAAAtC,OAAA,YAAA8V,KAAAxT,EAAA6T,WAAAjC,GAAA,KAAAuD,SAAA5E,EAAA,EAAA4E,SAAA,SAAAnF,EAAArG,GAAA,aAAAqG,EAAA3P,KAAA,MAAA2P,EAAAuB,IAAA,gBAAAvB,EAAA3P,MAAA,aAAA2P,EAAA3P,KAAA,KAAAmT,KAAAxD,EAAAuB,IAAA,WAAAvB,EAAA3P,MAAA,KAAA4U,KAAA,KAAA1D,IAAAvB,EAAAuB,IAAA,KAAA7T,OAAA,cAAA8V,KAAA,kBAAAxD,EAAA3P,MAAAsJ,IAAA,KAAA6J,KAAA7J,GAAAiI,CAAA,EAAAwD,OAAA,SAAApF,GAAA,QAAArG,EAAA,KAAAoK,WAAA9T,OAAA,EAAA0J,GAAA,IAAAA,EAAA,KAAAsG,EAAA,KAAA8D,WAAApK,GAAA,GAAAsG,EAAA4D,aAAA7D,EAAA,YAAAmF,SAAAlF,EAAAgE,WAAAhE,EAAA6D,UAAAE,EAAA/D,GAAA2B,CAAA,kBAAA5B,GAAA,QAAArG,EAAA,KAAAoK,WAAA9T,OAAA,EAAA0J,GAAA,IAAAA,EAAA,KAAAsG,EAAA,KAAA8D,WAAApK,GAAA,GAAAsG,EAAA0D,SAAA3D,EAAA,KAAAG,EAAAF,EAAAgE,WAAA,aAAA9D,EAAA9P,KAAA,KAAA+P,EAAAD,EAAAoB,IAAAyC,EAAA/D,EAAA,QAAAG,CAAA,YAAA7S,MAAA,0BAAA8X,cAAA,SAAA1L,EAAAsG,EAAAE,GAAA,YAAA6C,SAAA,CAAAxC,SAAA2B,EAAAxI,GAAA4J,WAAAtD,EAAAwD,QAAAtD,GAAA,cAAAzS,SAAA,KAAA6T,IAAAvB,GAAA4B,CAAA,GAAAjI,CAAA,UAAA2L,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAAnS,EAAAgO,GAAA,QAAAoE,EAAAJ,EAAAhS,GAAAgO,GAAArQ,EAAAyU,EAAAzU,KAAA,OAAA5C,GAAA,YAAAkX,EAAAlX,EAAA,CAAAqX,EAAA5C,KAAAJ,EAAAzR,GAAAwT,QAAA/B,QAAAzR,GAAA2R,KAAA4C,EAAAC,EAAA,UAAAE,EAAAC,GAAA,sBAAAC,EAAA,KAAAC,EAAAC,UAAA,WAAAtB,SAAA,SAAA/B,EAAA6C,GAAA,IAAAD,EAAAM,EAAAI,MAAAH,EAAAC,GAAA,SAAAN,EAAAvU,GAAAoU,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAA,OAAAxU,EAAA,UAAAwU,EAAAQ,GAAAZ,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAA,QAAAQ,EAAA,CAAAT,OAAA3K,EAAA,uCACMqL,EAAAA,iBAEN,IAAMC,EAAc,uCACdrM,EAAc,IAAIoM,EAAAA,gBAClBE,EAAiB,IAAIF,EAAAA,eAAoBC,EAAarM,OAAae,GACzEf,EAAYtE,UAAS,GAErBqQ,KAAKQ,YAAY,CACbjW,KAAM,sBAGV,IAAIkW,EAAmB,KACvBT,KAAKU,iBAAiB,WAAW,SAACC,GAC9B,GAAqB,+BAAjBA,EAAGrR,KAAK/E,KAAuC,CAC/C,IAAAqW,EAA2DD,EAAGrR,KAAtDuR,EAAYD,EAAZC,aAAcC,EAAYF,EAAZE,aAAcrL,EAAMmL,EAANnL,OAAQ7M,EAAUgY,EAAVhY,WAE5CoD,QAAQ4I,IAAI,6CACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA0C,IAAA,IAAAC,EAAAtW,EAAAuW,EAAArS,EAAA7B,EAAA8C,EAAAqR,EAAA/Z,EAAAwD,EAAAL,EAAA,OAAAwP,IAAAkB,MAAA,SAAAmG,GAAA,cAAAA,EAAAvC,KAAAuC,EAAA5D,MAAA,OAKsC,GALtC4D,EAAAvC,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GAE/CiC,EAAU0V,EAAejH,wBAAwBuH,GACjDO,EAAavW,EAAQmD,KACtBnD,EAAQ0W,YAAYT,GAAe,CAAFQ,EAAA5D,KAAA,wBAAA8D,OACjBJ,EAAU,+BAAAI,OAA8BV,GAAY,OAOzE,GALM/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAG5B5T,EAAUqT,EAAerM,cAAcjH,kBAAkB4T,GAG3DJ,IAAqBI,EAAY,CAAAS,EAAA5D,KAAA,gBAAA4D,EAAA5D,KAAA,GACd6C,EAAe1J,eAAegK,EAAcC,EAAcrL,EAAQ0L,GAAiB,QAAhGnR,EAAIsR,EAAAlE,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAC/CyQ,EAAmBI,EAAa,QAMpC,OAFMQ,EAAY,IAAIhB,EAAAA,sBAA2B,CAAC,SAAYtR,IAE9DuS,EAAA5D,KAAA,GACqB6C,EAAezK,IAChC+K,EACAC,EACArL,GACA,EACAvI,EACAmU,OACArM,OACAA,EACAmM,OACAnM,GACH,QAXG1N,EAAQga,EAAAlE,KAcZpR,QAAQ4I,IAAI,4CAAD4M,OAA6CR,YAAYC,MAAQF,EAAS,QAC/EjW,EAAUxD,EAASma,cACrBhX,EAAYnD,EAAS6R,iBAErBkH,EAAAA,wBAA6B5V,EAAWwJ,EAAYxD,QAAQ1B,GAAU,GAAIlE,EAAS,SACnFJ,EAAYA,EAAUyB,WACtBF,QAAQ4I,IAAI,oCAAsCnK,IAElDA,EAAY,GAGhBuB,QAAQ4I,IAAI,gCAAD4M,OAAiC1W,IAC5CkV,KAAKQ,YAAY,CACbjW,KAAM,8BACNO,QAAS,CAACA,QAASA,EAASL,UAAWA,KACxC6W,EAAA5D,KAAA,iBAAA4D,EAAAvC,KAAA,GAAAuC,EAAAI,GAAAJ,EAAA,SAEHtV,QAAQxD,MAAK8Y,EAAAI,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcL,EAAAI,GAAMxV,aACrB,yBAAAoV,EAAApC,OAAA,GAAAgC,EAAA,kBA5DXpB,EA+DJ,MAAO,GAAqB,kCAAjBa,EAAGrR,KAAK/E,KAA0C,CACzD,IAAAqX,EASIjB,EAAGrR,KARHuS,EAAaD,EAAbC,cACAf,EAAYc,EAAZd,aACArL,EAAMmM,EAANnM,OACA7M,EAAUgZ,EAAVhZ,WACA2L,EAAGqN,EAAHrN,IACAC,EAAUoN,EAAVpN,WACAE,EAASkN,EAATlN,UACAtN,EAAGwa,EAAHxa,IAGJ4E,QAAQ4I,IAAI,qCACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAAsD,IAAA,IAAAX,EAAAtW,EAAAuW,EAAArS,EAAAiB,EAAAqR,EAAA7W,EAAA,OAAAyP,IAAAkB,MAAA,SAAA4G,GAAA,cAAAA,EAAAhD,KAAAgD,EAAArE,MAAA,OAGO,OAHPqE,EAAAhD,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GACrDmZ,EAAArE,KAAA,EACsB6C,EAAerM,cAAcnH,iBAAiB8U,GAAc,OACnD,GADzBhX,EAAOkX,EAAA3E,KACPgE,EAAavW,EAAQmD,KACtBnD,EAAQ0W,YAAYT,GAAe,CAAFiB,EAAArE,KAAA,wBAAA8D,OACjBJ,EAAU,+BAAAI,OAA8BV,GAAY,OAI3B,GAAxC/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAC7BP,EAAetM,YAAY5D,aAAatB,GAAW,CAAFgT,EAAArE,KAAA,SACoD,OAAtG1R,QAAQ4I,IAAI,2DAAD4M,OAA4DJ,EAAU,KAAAI,OAAIV,EAAY,MAAKiB,EAAArE,KAAA,GACnF6C,EAAe1J,eAAegL,EAAef,EAAcrL,EAAQ0L,GAAiB,QAAjGnR,EAAI+R,EAAA3E,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAAM,QAOI,OAHvDqR,EAAY,IAAIhB,EAAAA,sBAA2B,CAAC,SAAYtR,IAG3C,iBAAR3H,GAAoBmZ,EAAelY,QAAQjB,GAAO2a,EAAArE,KAAA,GACnC6C,EAAe1K,QAAQ,CAC7CN,YAAa6L,EACb5L,aAAcsL,EACdvM,IAAKA,EACLC,WAAYA,EACZiB,OAAQA,EACRC,gBAAiB2L,EACjB3M,UAAWA,EACX9L,WAAYuY,IACd,QATI3W,EAAWuX,EAAA3E,KAYjBpR,QAAQ4I,IAAI,yDAAD4M,OAA0DR,YAAYC,MAAQF,EAAS,QAClGf,KAAKQ,YAAY,CACbjW,KAAM,kCACNyX,mBAAoBxX,IACrBuX,EAAArE,KAAA,iBAAAqE,EAAAhD,KAAA,GAAAgD,EAAAL,GAAAK,EAAA,SAEH/V,QAAQxD,MAAM,yCAADgZ,OAAAO,EAAAL,KACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcI,EAAAL,GAAMxV,aACrB,QAEiC,OAFjC6V,EAAAhD,KAAA,GAEHwB,EAAelY,QAAQiY,GAAayB,EAAAzC,OAAA,6BAAAyC,EAAA7C,OAAA,GAAA4C,EAAA,wBA/C5ChC,EAkDJ,MAAO,GAAqB,gCAAjBa,EAAGrR,KAAK/E,KAAwC,CACvD,IAAA0X,EACItB,EAAGrR,KADCuS,EAAaI,EAAbJ,cAAejZ,EAAUqZ,EAAVrZ,WAAYkY,EAAYmB,EAAZnB,aAAcrL,EAAMwM,EAANxM,OAAQrO,EAAG6a,EAAH7a,IAGzD4E,QAAQ4I,IAAI,2CACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA0D,IAAA,IAAAf,EAAAtW,EAAAuW,EAAArS,EAAA7B,EAAA8C,EAAAmS,EAAAC,EAAAnS,EAAAC,EAAAmS,EAAA,OAAApI,IAAAkB,MAAA,SAAAmH,GAAA,cAAAA,EAAAvD,KAAAuD,EAAA5E,MAAA,OAGO,OAHP4E,EAAAvD,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GACrD0Z,EAAA5E,KAAA,EACsB6C,EAAerM,cAAcnH,iBAAiB8U,GAAc,OACnD,GADzBhX,EAAOyX,EAAAlF,KACPgE,EAAavW,EAAQmD,KACtBnD,EAAQ0X,eAAe9W,SAASqV,GAAe,CAAFwB,EAAA5E,KAAA,wBAAA8D,OAC7BJ,EAAU,+BAAAI,OAA8BV,GAAY,OAE3B,OAAxC/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAAYwB,EAAA5E,KAAA,GACxB6C,EAAerM,cAAcjH,kBAAkB4U,GAAc,QAAtE,GAAP3U,EAAOoV,EAAAlF,KAGRmD,EAAetM,YAAY5D,aAAatB,GAAW,CAAFuT,EAAA5E,KAAA,SACoD,OAAtG1R,QAAQ4I,IAAI,2DAAD4M,OAA4DJ,EAAU,KAAAI,OAAIV,EAAY,MAAKwB,EAAA5E,KAAA,GACnF6C,EAAe1J,eAAehM,EAAQqB,WAAY4U,EAAcrL,EAAQ0L,GAAiB,QAAtGnR,EAAIsS,EAAAlF,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAAM,QAI1B,OAD/BmS,EACmC5B,EAAetM,YAAYxD,QAAQ1B,KAAS,EAAAqT,MAAAD,wBAAxElS,EAAUmS,EAAA,GAAElS,EAAYkS,EAAA,GAAAE,EAAA5E,KAAA,GACR2C,EAAAA,mBAAwBmC,qBAC3CrB,EACAU,EACAf,EACArL,EACArO,EACA8F,EACA+C,EACAC,OACA8E,GACH,QAVGqN,EAAUC,EAAAlF,KAadpR,QAAQ4I,IAAI,0CAAD4M,OAA2CR,YAAYC,MAAQF,EAAS,QACnF/U,QAAQ4I,IAAI,6BAAD4M,OAA8Ba,EAAU,kBACnDrC,KAAKQ,YAAY,CACbjW,KAAM,qCACNkY,aAAcC,OAAOL,GAAc,IAAU,MAC9CC,EAAA5E,KAAA,iBAAA4E,EAAAvD,KAAA,GAAAuD,EAAAZ,GAAAY,EAAA,SAEHtW,QAAQxD,MAAK8Z,EAAAZ,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcW,EAAAZ,GAAMxV,aACrB,yBAAAoW,EAAApD,cAAA,GAAAgD,EAAA,kBA7CXpC,EAgDJ,MAAO,GAAqB,iCAAjBa,EAAGrR,KAAK/E,KAAyC,CACxD,IAAAoY,EAAyBhC,EAAGrR,KAApBzE,EAAO8X,EAAP9X,QAAY8X,EAAHvb,IAEjB4E,QAAQ4I,IAAI,4CAEZ,IAAImM,EAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAoE,IAAA,IAAA1V,EAAA2V,EAAA,OAAA5I,IAAAkB,MAAA,SAAA2H,GAAA,cAAAA,EAAA/D,KAAA+D,EAAApF,MAAA,cAAAoF,EAAA/D,KAAA,EAAA+D,EAAApF,KAAA,EAE6B6C,EAAerM,cAAcjH,kBAAkBpC,GAAQ,OAClC,OADrCqC,EAAO4V,EAAA1F,KACbpR,QAAQ4I,IAAI,+BAA+BkO,EAAApF,KAAA,EAEjC2C,EAAAA,mBAAwB0C,sBAC1BlY,EACAqC,GACH,OAJD2V,EAAaC,EAAA1F,KAOjBpR,QAAQ4I,IAAI,sDAAD4M,OAAuDR,YAAYC,MAAQF,EAAS,QAC/F/U,QAAQ4I,IAAI,8BAAD4M,OAA+BqB,EAAa,kBACvD7C,KAAKQ,YAAY,CACbjW,KAAM,sCACNsY,cAAeH,OAAOG,GAAiB,IAAU,MAClDC,EAAApF,KAAA,iBAAAoF,EAAA/D,KAAA,GAAA+D,EAAApB,GAAAoB,EAAA,SAEH9W,QAAQxD,MAAKsa,EAAApB,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcmB,EAAApB,GAAMxV,aACrB,yBAAA4W,EAAA5D,OAAA,GAAA0D,EAAA,kBAtBX9C,EAyBJ,MAAO,GAAqB,kBAAjBa,EAAGrR,KAAK/E,KAA0B,CACzC,IAAAyY,EAUIrC,EAAGrR,KATH1G,EAAUoa,EAAVpa,WACAqa,EAAaD,EAAbC,cACA/L,EAAS8L,EAAT9L,UACAgM,EAAaF,EAAbE,cACAzM,EAAYuM,EAAZvM,aACAlC,EAAGyO,EAAHzO,IACAC,EAAUwO,EAAVxO,WACAE,EAASsO,EAATtO,UACAtN,EAAG4b,EAAH5b,IAGJ4E,QAAQ4I,IAAI,yCAAD4M,OACkC0B,EAAa,QAE1D,IAAInC,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA2E,IAAA,IAAA3Y,EAAA,OAAAyP,IAAAkB,MAAA,SAAAiI,GAAA,cAAAA,EAAArE,KAAAqE,EAAA1F,MAAA,OAKO,OALP0F,EAAArE,KAAA,EAG0B,iBAAR3X,GAAoBmZ,EAAelY,QAAQjB,GAEtDgc,EAAA1F,KAAA,EAC0B6C,EAAe7I,SACrCuL,EACA/L,EACAgM,EACA3O,EACAC,OACAQ,EACAyB,EACA/B,EACA2L,EAAAA,WAAgB1W,YAAYf,QAC5BoM,GACH,OAXKxK,EAAW4Y,EAAAhG,KAcjBpR,QAAQ4I,IAAI,oCAAD4M,OAAqChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,EAAS,QACvGf,KAAKQ,YAAY,CACbjW,KAAM,iCACN8Y,oBAAqB7Y,IACtB4Y,EAAA1F,KAAA,gBAAA0F,EAAArE,KAAA,EAAAqE,EAAA1B,GAAA0B,EAAA,SAEHpX,QAAQxD,MAAK4a,EAAA1B,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcyB,EAAA1B,GAAMxV,aACrB,QAEiC,OAFjCkX,EAAArE,KAAA,GAEHwB,EAAelY,QAAQiY,GAAa8C,EAAA9D,OAAA,6BAAA8D,EAAAlE,OAAA,GAAAiE,EAAA,uBAhC5CrD,EAmCJ,MAAO,GAAqB,gBAAjBa,EAAGrR,KAAK/E,KAAwB,CACvC,IAAA+Y,EAAiE3C,EAAGrR,KAA5DzE,EAAOyY,EAAPzY,QAASjC,EAAU0a,EAAV1a,WAAY2L,EAAG+O,EAAH/O,IAAKC,EAAU8O,EAAV9O,WAAYE,GAAS4O,EAAT5O,UAAWtN,GAAGkc,EAAHlc,IAEzD4E,QAAQ4I,IAAI,sCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAA+E,IAAA,IAAA5O,EAAA6O,EAAAhZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAAsI,GAAA,cAAAA,EAAA1E,KAAA0E,EAAA/F,MAAA,OASgC,OAThC+F,EAAA1E,KAAA,EAG0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAGhDuN,EAAgB4L,EAAejH,wBAAwBzO,GAGzD2Y,GAAgB,EAAKC,EAAA1E,KAAA,EAAA0E,EAAA/F,KAAA,EAEf6C,EAAerM,cAAcrH,WAAW8H,EAAc3G,MAAK,OACjEwV,GAAgB,EAAKC,EAAA/F,KAAA,iBAAA+F,EAAA1E,KAAA,GAAA0E,EAAA/B,GAAA+B,EAAA,SAErBzX,QAAQ4I,IAAI,yEAEV,YAGF4O,EAAe,CAAFC,EAAA/F,KAAA,yBAAA8D,OACI7M,EAAc3G,KAAI,0CAIvC,OADAhC,QAAQ4I,IAAI,WAAYL,GACxBkP,EAAA/F,KAAA,GACwB6C,EAAejM,OACnCzJ,EACA0J,EACAC,OACAQ,EACAN,GACA2L,EAAAA,WAAgB1W,YAAYf,IAC/B,QAPG4B,EAAWiZ,EAAArG,KAUfpR,QAAQ4I,IAAI,sCAAD4M,OAAuChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACzGf,KAAKQ,YAAY,CACbjW,KAAM,+BACNmZ,kBAAmBlZ,IACpBiZ,EAAA/F,KAAA,iBAAA+F,EAAA1E,KAAA,GAAA0E,EAAAE,GAAAF,EAAA,SAEHzX,QAAQ4I,IAAG6O,EAAAE,IACX3D,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAc8B,EAAAE,GAAMzX,aACrB,QAEiC,OAFjCuX,EAAA1E,KAAA,GAEHwB,EAAelY,QAAQiY,GAAamD,EAAAnE,OAAA,6BAAAmE,EAAAvE,OAAA,GAAAqE,EAAA,+BA/C5CzD,EAkDJ,MAAO,GAAqB,eAAjBa,EAAGrR,KAAK/E,KAAuB,CACtC,IAAAqZ,GAAiDjD,EAAGrR,KAA5CkH,GAAWoN,GAAXpN,YAAavL,GAAM2Y,GAAN3Y,OAAQrC,GAAUgb,GAAVhb,WAAYxB,GAAGwc,GAAHxc,IAEzC4E,QAAQ4I,IAAI,iCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAqF,IAAA,IAAArZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAA2I,GAAA,cAAAA,EAAA/E,KAAA+E,EAAApG,MAAA,OAKO,OALPoG,EAAA/E,KAAA,EAG0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAEtD0c,EAAApG,KAAA,EAC0B6C,EAAepN,MACrCqD,GACAvL,GACAoV,EAAAA,WAAgB1W,YAAYf,SAC5BoM,GACH,OALKxK,EAAWsZ,EAAA1G,KAQjBpR,QAAQ4I,IAAI,iCAAD4M,OAAkChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACpGf,KAAKQ,YAAY,CACbjW,KAAM,8BACNwZ,iBAAkBvZ,IACnBsZ,EAAApG,KAAA,gBAAAoG,EAAA/E,KAAA,EAAA+E,EAAApC,GAAAoC,EAAA,SAEH9X,QAAQ4I,IAAGkP,EAAApC,IACX1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcmC,EAAApC,GAAMxV,aACrB,QAEiC,OAFjC4X,EAAA/E,KAAA,GAEHwB,EAAelY,QAAQiY,GAAawD,EAAAxE,OAAA,6BAAAwE,EAAA5E,OAAA,GAAA2E,EAAA,uBA1B5C/D,EA6BJ,MAAO,GAAqB,cAAjBa,EAAGrR,KAAK/E,KAAsB,CACrC,IAAAyZ,GACIrD,EAAGrR,KADC4G,GAAS8N,GAAT9N,UAAWC,GAAS6N,GAAT7N,UAAW5B,GAAGyP,GAAHzP,IAAKC,GAAUwP,GAAVxP,WAAYE,GAASsP,GAATtP,UAAW9L,GAAUob,GAAVpb,WAAYxB,GAAG4c,GAAH5c,IAGtE4E,QAAQ4I,IAAI,gCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAyF,IAAA,IAAAzZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAA+I,GAAA,cAAAA,EAAAnF,KAAAmF,EAAAxG,MAAA,OAMO,OANPwG,EAAAnF,KAAA,EAI0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAEtD8c,EAAAxG,KAAA,EAC0B6C,EAAetN,KACrCiD,GACAC,GACA5B,GACAC,QACAQ,EACAN,GACA2L,EAAAA,WAAgB1W,YAAYf,SAC5BoM,GACH,OATKxK,EAAW0Z,EAAA9G,KAYjBpR,QAAQ4I,IAAI,gCAAD4M,OAAiChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACnGf,KAAKQ,YAAY,CACbjW,KAAM,6BACN4Z,gBAAiB3Z,IAClB0Z,EAAAxG,KAAA,gBAAAwG,EAAAnF,KAAA,EAAAmF,EAAAxC,GAAAwC,EAAA,SAEHlY,QAAQ4I,IAAGsP,EAAAxC,IACX1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcuC,EAAAxC,GAAMxV,aACrB,QAEiC,OAFjCgY,EAAAnF,KAAA,GAEHwB,EAAelY,QAAQiY,GAAa4D,EAAA5E,OAAA,6BAAA4E,EAAAhF,OAAA,GAAA+E,EAAA,uBA/B5CnE,EAkCJ,CACJ","sources":["webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/./src/workers/worker.js"],"sourcesContent":["export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","import * as aleo from \"@provablehq/sdk\";\n\nawait aleo.initThreadPool();\n\nconst defaultHost = \"https://api.explorer.provable.com/v1\";\nconst keyProvider = new aleo.AleoKeyProvider();\nconst programManager = new aleo.ProgramManager(defaultHost, keyProvider, undefined);\nkeyProvider.useCache(true);\n\nself.postMessage({\n type: \"ALEO_WORKER_READY\",\n});\n\nlet lastLocalProgram = null;\nself.addEventListener(\"message\", (ev) => {\n if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_LOCAL\") {\n const { localProgram, aleoFunction, inputs, privateKey } = ev.data;\n\n console.log(\"Web worker: Executing function locally...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = programManager.networkClient.getProgramImports(localProgram);\n\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(localProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey});\n\n // Execute the function locally\n let response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n false,\n imports,\n keyParams,\n undefined,\n undefined,\n privateKeyObject,\n undefined\n );\n\n // Return the outputs to the main thread\n console.log(`Web worker: Local execution completed in ${performance.now() - startTime} ms`);\n const outputs = response.getOutputs();\n let execution = response.getExecution();\n if (execution) {\n aleo.verifyFunctionExecution(execution, keyProvider.getKeys(cacheKey)[1], program, \"hello\");\n execution = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n execution = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n self.postMessage({\n type: \"OFFLINE_EXECUTION_COMPLETED\",\n outputs: {outputs: outputs, execution: execution}\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_ON_CHAIN\") {\n const {\n remoteProgram,\n aleoFunction,\n inputs,\n privateKey,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\"Web worker: Creating execution...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey)\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n\n // Get the proving and verifying keys for the function\n const cacheKey = `${program_id}:${aleoFunction}`;\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(remoteProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey})\n\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n const transaction = await programManager.execute({\n programName: program_id,\n functionName: aleoFunction,\n fee: fee,\n privateFee: privateFee,\n inputs: inputs,\n keySearchParams: keyParams,\n feeRecord: feeRecord,\n privateKey: privateKeyObject\n });\n\n // Return the transaction id to the main thread\n console.log(`Web worker: On-chain execution transaction created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"EXECUTION_TRANSACTION_COMPLETED\",\n executeTransaction: transaction,\n });\n } catch (error) {\n console.error(`Error creating execution transaction: ${error}`);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_EXECUTION_FEE\") {\n const { remoteProgram, privateKey, aleoFunction, inputs, url } =\n ev.data;\n\n console.log(\"Web worker: Estimating execution fee...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.getFunctions().includes(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n const imports = await programManager.networkClient.getProgramImports(remoteProgram);\n\n // Get the proving and verifying keys for the function\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(program.toString(), aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Estimate the execution fee\n const [provingKey, verifyingKey] = programManager.keyProvider.getKeys(cacheKey);\n let executeFee = await aleo.ProgramManagerBase.estimateExecutionFee(\n privateKeyObject,\n remoteProgram,\n aleoFunction,\n inputs,\n url,\n imports,\n provingKey,\n verifyingKey,\n undefined\n );\n\n // Return the execution fee estimate to the main thread\n console.log(`Web worker: Execution fee estimated in ${performance.now() - startTime} ms`);\n console.log(`Execution Fee Estimation: ${executeFee} microcredits`);\n self.postMessage({\n type: \"EXECUTION_FEE_ESTIMATION_COMPLETED\",\n executionFee: Number(executeFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_DEPLOYMENT_FEE\") {\n const { program, url } = ev.data;\n\n console.log(\"Web worker: Estimating deployment fee...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n const imports = await programManager.networkClient.getProgramImports(program);\n console.log(\"Estimating deployment fee..\");\n let deploymentFee =\n await aleo.ProgramManagerBase.estimateDeploymentFee(\n program,\n imports,\n );\n\n // Return the deployment fee estimate to the main thread\n console.log(`Web worker: Deployment fee estimation completed in ${performance.now() - startTime} ms`);\n console.log(`Deployment Fee Estimation: ${deploymentFee} microcredits`);\n self.postMessage({\n type: \"DEPLOYMENT_FEE_ESTIMATION_COMPLETED\",\n deploymentFee: Number(deploymentFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_TRANSFER\") {\n const {\n privateKey,\n amountCredits,\n recipient,\n transfer_type,\n amountRecord,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\n `Web worker: Creating transfer of type ${transfer_type}...`,\n );\n let startTime = performance.now();\n\n (async function () {\n try {\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the transfer transaction and submit it to the network\n const transaction = await programManager.transfer(\n amountCredits,\n recipient,\n transfer_type,\n fee,\n privateFee,\n undefined,\n amountRecord,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Transfer transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"TRANSFER_TRANSACTION_COMPLETED\",\n transferTransaction: transaction,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_DEPLOY\") {\n const { program, privateKey, fee, privateFee, feeRecord, url } = ev.data;\n\n console.log(\"Web worker: Creating deployment...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Check if the program is valid\n const programObject = programManager.createProgramFromSource(program);\n\n // Check if the program already exists on the network. If so, throw an error\n let programExists = false;\n try {\n await programManager.networkClient.getProgram(programObject.id());\n programExists = true;\n } catch (e) {\n console.log(\n `Program not found on the Aleo Network - proceeding with deployment...`,\n );\n }\n\n if (programExists) {\n throw `Program ${programObject.id()} already exists on the network`;\n }\n\n console.log(\"fee is: \", fee);\n // Create the deployment transaction and submit it to the network\n let transaction = await programManager.deploy(\n program,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n )\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Deployment transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"DEPLOY_TRANSACTION_COMPLETED\",\n deployTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_SPLIT\") {\n const { splitAmount, record, privateKey, url } = ev.data;\n\n console.log(\"Web worker: Creating split...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the split transaction and submit to the network\n const transaction = await programManager.split(\n splitAmount,\n record,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Split transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"SPLIT_TRANSACTION_COMPLETED\",\n splitTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_JOIN\") {\n const { recordOne, recordTwo, fee, privateFee, feeRecord, privateKey, url } =\n ev.data;\n\n console.log(\"Web worker: Creating join...\");\n\n let startTime = performance.now();\n (async function () {\n\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the join transaction and submit it to the network\n const transaction = await programManager.join(\n recordOne,\n recordTwo,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Join transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"JOIN_TRANSACTION_COMPLETED\",\n joinTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n }\n});\n"],"names":["async","get","url","options","response","fetch","ok","Error","status","post","method","AleoNetworkClient","host","headers","account","constructor","this","setAccount","getAccount","setHost","fetchData","json","error","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","RecordCiphertext","fromString","value","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","console","warn","toString","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","message","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","undefined","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","_regeneratorRuntime","t","r","prototype","n","o","defineProperty","Symbol","a","iterator","c","asyncIterator","u","toStringTag","define","enumerable","configurable","writable","wrap","Generator","create","Context","makeInvokeMethod","tryCatch","arg","call","h","f","s","y","GeneratorFunction","GeneratorFunctionPrototype","p","d","getPrototypeOf","v","values","g","defineIteratorMethods","forEach","_invoke","AsyncIterator","invoke","_typeof","resolve","__await","then","callInvokeWithMethodAndArg","done","delegate","maybeInvokeDelegate","sent","_sent","dispatchException","abrupt","TypeError","resultName","next","nextLoc","pushTryEntry","tryLoc","catchLoc","finallyLoc","afterLoc","tryEntries","resetTryEntry","completion","reset","isNaN","displayName","isGeneratorFunction","mark","setPrototypeOf","__proto__","awrap","Promise","reverse","pop","prev","charAt","slice","stop","rval","handle","complete","finish","delegateYield","asyncGeneratorStep","gen","reject","_next","_throw","info","_asyncToGenerator","fn","self","args","arguments","apply","err","aleo","defaultHost","programManager","postMessage","lastLocalProgram","addEventListener","ev","_ev$data","localProgram","aleoFunction","startTime","performance","now","_callee","privateKeyObject","program_id","keyParams","_context","hasFunction","concat","getOutputs","t0","errorMessage","_ev$data2","remoteProgram","_callee2","_context2","executeTransaction","_ev$data3","_callee3","_programManager$keyPr","_programManager$keyPr2","executeFee","_context3","getFunctions","estimateExecutionFee","executionFee","Number","_ev$data4","_callee4","deploymentFee","_context4","estimateDeploymentFee","_ev$data5","amountCredits","transfer_type","_callee5","_context5","transferTransaction","_ev$data6","_callee6","programExists","_context6","deployTransaction","t1","_ev$data7","_callee7","_context7","splitTransaction","_ev$data8","_callee8","_context8","joinTransaction"],"sourceRoot":""} \ No newline at end of file +{"version":3,"file":"383.bundle.js","mappings":";iWAAOA,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,sBAAwBN,GAG9D,OAAOE,CACX,CAGOJ,eAAeS,EAAKP,EAAmBC,GAC1CA,EAAQO,OAAS,OAEjB,MAAMN,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,uBAAyBN,GAG/D,OAAOE,CACX,CCUA,MAAMO,EACJC,KACAC,QACAC,QAEAC,WAAAA,CAAYH,EAAcT,GACxBa,KAAKJ,KAAOA,EAAO,WAEfT,GAAWA,EAAQU,QACrBG,KAAKH,QAAUV,EAAQU,QAGvBG,KAAKH,QAAU,CAEb,qBAAsB,UAa5BI,UAAAA,CAAWH,GACTE,KAAKF,QAAUA,EASjBI,UAAAA,GACE,OAAOF,KAAKF,QASdK,OAAAA,CAAQP,GACNI,KAAKJ,KAAOA,EAAO,WAGrB,eAAMQ,CACFlB,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIe,KAAKJ,KAAOV,EAAK,CAC1CW,QAASG,KAAKH,UAGhB,aAAaT,EAASiB,OACpB,MAAOC,GACP,MAAM,IAAIf,MAAM,yBA2BpB,wBAAMgB,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIjB,MAAM,mDAIlB,MAAMuB,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfZ,EAA4B,CACrC,QAA4B,IAAjBV,KAAKF,QACd,MAAM,IAAIP,MAAM,oGAEhB2B,EAAqBlB,KAAKF,QAAQyB,iBAGpC,IACEL,EAAqBR,aAAsBc,EAAAA,GAAad,EAAac,EAAAA,GAAWC,YAAYf,GAC5F,MAAOJ,GACP,MAAM,IAAIf,MAAM,uCAGpB,MAAMmC,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoB5B,KAAK6B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIrC,MAAM,uCAFhB4B,EAAeS,EAIjB,MAAOtB,GACP,MAAM,IAAIf,MAAM,uCAWlB,GANE0B,EADuB,iBAAdR,GAA0BA,GAAaU,EAC1CV,EAEAU,EAIJX,EAAcS,EAChB,MAAM,IAAI1B,MAAM,0DAIlB,KAAO0B,EAAMT,GAAa,CACxBQ,EAAQC,EAAM,GACVD,EAAQR,IACVQ,EAAQR,GAEV,IAEE,MAAMsB,QAAe9B,KAAK+B,cAAcf,EAAOC,GAE/C,GADAA,EAAMD,IACAc,aAAkBvC,OAEtB,IAAK,IAAIyC,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAASC,EAAAA,GAAiBC,WAAWH,EAAOI,OAElD,GAAIH,EAAOI,QAAQzB,GAAU,CAE3B,MAAM0B,EAAkBL,EAAOM,QAAQ3B,GAGjC4B,EAAQF,EAAgBE,QAC9B,GAAIzC,EAAO0C,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBvC,EAAoB,eAAgB,WAE5F,UACQlB,KAAK0D,gBAAgBF,GAC3B,MAAOlD,GAEP,IAAKK,IACHG,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQsB,OAAS,EAAG,CAC3D,IAAI4B,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiBjD,EAAQkD,GAAgB,CAIzD,GAHAA,GAAiB,EACjB/C,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQmB,QAAUtB,EAAQsB,OAC5B,OAAOnB,MAMnB,MAAOR,GAAQ,OAYrC,MAAOA,GAKP,GAHAwD,QAAQC,KAAK,mCAAqC/C,EAAMgD,WAAa,IAAM/C,EAAI+C,YAC/EF,QAAQC,KAAK,UAAWzD,GACxBc,GAAY,EACRA,EAAW,GAEb,OADA0C,QAAQC,KAAK,0EACNjD,GAIb,OAAOA,EAUT,cAAMmD,CAASC,GACb,IAEE,aADoBlE,KAAKI,UAAiB,UAAY8D,GAEtD,MAAO5D,GACP,MAAM,IAAIf,MAAM,0BAYpB,mBAAMwC,CAAcf,EAAeC,GACjC,IACE,aAAajB,KAAKI,UAAwB,iBAAmBY,EAAQ,QAAUC,GAC/E,MAAOX,GAEP,MAAM,IAAIf,MADW,iCAAmCyB,EAAQ,QAAUC,EAAM,MAWpF,0CAAMkD,CAAqCxB,GACrCA,aAAmByB,EAAAA,KACrBzB,EAAUA,EAAQqB,YAEpB,IAEE,aADiBhE,KAAKI,UAAkB,kCAAoCuC,IAClE0B,QAAQ,IAAM,IACxB,MAAO/D,GACP,MAAM,IAAIf,MAAM,uDAUpB,wCAAM+E,CAAmC3B,GACvC,IACE,MAAM4B,QAA+BvE,KAAKmE,qCAAqCxB,GAC/E,aAA+B3C,KAAKwE,eAAeD,GACnD,MAAOjE,GACP,MAAM,IAAIf,MAAM,uDAUpB,oBAAMkF,GACJ,IACE,aAAazE,KAAKI,UAAiB,iBACnC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCASpB,wBAAMmF,GACJ,IACE,aAAa1E,KAAKI,UAAkB,qBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCAUpB,qBAAMsC,GACJ,IACE,aAAa7B,KAAKI,UAAkB,kBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,kCAepB,gBAAMoF,CAAWC,GACf,IACE,aAAa5E,KAAKI,UAAkB,YAAcwE,GAClD,MAAOtE,GACP,MAAM,IAAIf,MAAM,2BAqBpB,sBAAMsF,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnB,WAAW6B,GAC1B,MAAOxE,GACP,IACE,OAAO8D,EAAAA,GAAQnB,iBAA0BjD,KAAK2E,WAAWG,IACzD,MAAOxE,GACP,MAAM,IAAIf,MAAM,GAAGuF,oDA8BzB,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIlD,EAAI,EAAGA,EAAIiD,EAAWhD,OAAQD,IAAK,CAC1C,MAAMmD,EAAYF,EAAWjD,GAC7B,IAAKgD,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8BrF,KAAK2E,WAAWQ,GAC9CG,QAAsCtF,KAAK+E,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,GAGzB,OAAOL,EACP,MAAO1E,GACP,MAAMkF,EAAY,mCAAqClF,IAe3D,2BAAMmF,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IACxFI,aACf,MAAO5E,GACP,MAAM,IAAIf,MAAM,8CAAgDe,IAapE,4BAAMoF,CAAuBd,GAC3B,IACE,aAAa5E,KAAKI,UAAyB,YAAcwE,EAAY,aACrE,MAAOtE,GACP,MAAM,IAAIf,MAAM,6FAkBpB,4BAAMoG,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAavF,KAAKI,UAAkB,YAAcwE,EAAY,YAAcgB,EAAc,IAAML,GAChG,MAAOjF,GACP,MAAM,IAAIf,MAAM,oFAUpB,kBAAMsG,GACJ,IACE,aAAa7F,KAAKI,UAAkB,qBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,mCAWpB,oBAAMiF,CAAesB,GACnB,IACA,aAAa9F,KAAKI,UAA4B,gBAAkB0F,GAC9D,MAAOxF,GACP,MAAM,IAAIf,MAAM,gCAWpB,qBAAMwG,CAAgB7B,GACpB,IACA,aAAalE,KAAKI,UAAmC,UAAY8D,EAAOF,WAAa,iBACnF,MAAO1D,GACP,MAAM,IAAIf,MAAM,iCAUpB,8BAAMyG,GACJ,IACE,aAAahG,KAAKI,UAAmC,4BACrD,MAAOE,GACP,MAAM,IAAIf,MAAM,8CAWpB,qBAAMmE,CAAgBuC,GACpB,IACE,aAAajG,KAAKI,UAAkB,sBAAwB6F,GAC5D,MAAO3F,GACP,MAAM,IAAIf,MAAM,kCAUpB,uBAAM2G,CAAkB5D,GACtB,MAAM6D,EAAqB7D,aAAuB8D,EAAAA,GAAc9D,EAAY0B,WAAa1B,EACzF,IACE,MAAMlD,QAAiBK,EAAKO,KAAKJ,KAAO,yBAA0B,CAChEyG,KAAMF,EACNtG,QAASyG,OAAOC,OAAO,CAAC,EAAGvG,KAAKH,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaT,EAASiB,OAEtB,MAAOC,GACP,MAAM,IAAIf,MAAM,qDAAsDe,EAAgBkG,YAExF,MAAOlG,GACP,MAAM,IAAIf,MAAM,oDAAqDe,EAAgBkG,aChnB3F,MAAMC,EACFC,KACAC,UACAC,YACAC,SAUA9G,WAAAA,CAAY+G,GACR9G,KAAK2G,UAAYG,EAAOH,UACxB3G,KAAK4G,YAAcE,EAAOF,YAC1B5G,KAAK6G,SAAWC,EAAOD,SACvB7G,KAAK0G,KAAOI,EAAOJ,MAyK3B,MAAMK,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFjI,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBkI,QAAahI,EAASiI,cAC5B,OAAO,IAAIC,WAAWF,GACpB,MAAO9G,GACL,MAAM,IAAIf,MAAM,uBAAyBe,IAIjDP,WAAAA,GACIC,KAAKkH,QAAUK,EACfvH,KAAKgH,MAAQ,IAAIQ,IACjBxH,KAAKiH,aAAc,EAQvBQ,QAAAA,CAASA,GACLzH,KAAKiH,YAAcQ,EAMvBC,UAAAA,GACI1H,KAAKgH,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC9H,KAAKgH,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAO7H,KAAKgH,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAO7H,KAAKgH,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/D,QAAQ0E,MAAM,2CAA2CX,KACrD7H,KAAKgH,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC1I,KAAKgH,MAAM/H,IAAI4I,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,IAEtE,OAAO,IAAInJ,MAAM,2BAwBzB,kBAAMuJ,CAAahC,GACf,GAAIA,EAAQ,CACR,IAAIiC,EACAC,EACAnC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIvB,EAAM0D,EAAqBC,OAAOpC,EAAa,MACnD,KAAMvB,aAAehG,OACjB,OAAOS,KAAKmJ,iBAAiB5D,GAgBrC,GAZI,cAAeuB,GAAwC,iBAAvBA,EAAkB,YAClDiC,EAAYjC,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDkC,EAAclC,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5BiC,GAAaC,EACb,aAAahJ,KAAKoJ,gBAAgBL,EAAWC,EAAanC,GAG9D,GAAIA,EACA,OAAO7G,KAAKuI,QAAQ1B,GAG5B,MAAMtH,MAAM,oGA4BhB,qBAAM6J,CAAgBL,EAAmBC,EAAqBnC,GAC1D,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,MAAO,CAACyF,EAAAA,GAAWC,UAAU1F,EAAM,IAAK2F,EAAAA,GAAaD,UAAU1F,EAAM,KAClE,CACHY,QAAQ0E,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAC1EjF,QAAQ0E,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoChI,KAAKqJ,gBAAgBL,GAE/D,OADAhJ,KAAKgH,MAAMiB,IAAIpB,EAAU,CAACkB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,IAGvB,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAE1E,MAAO,CAAChB,QADkC/H,KAAKqJ,gBAAgBL,KAGrE,MAAO1I,GACL,MAAM,IAAIf,MAAgB,UAAAe,kDAAsDyI,SAAiBC,OAYzG,qBAAMM,CAAgBP,EAAmBlC,GACrC,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,OAAOyF,EAAAA,GAAWC,UAAU1F,EAAM,IAElCY,QAAQ0E,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAM9E,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAGhF,MAAOzI,GACL,MAAM,IAAIf,MAAM,UAAUe,oCAAwCyI,MAI1E,sBAAMI,CAAiB5D,GACnB,IACI,GAAKvF,KAAKgH,MAAMoB,IAAI7C,EAAIgE,UAAavJ,KAAKiH,YAOnC,CACH,MAAMuC,EAAyBxJ,KAAKgH,MAAM/H,IAAIsG,EAAIgE,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,KATtB,CACnD,MAAMC,EAAgBlE,EAAIyC,eACpB0B,QAAgC1J,KAAKsJ,gBAAgB/D,EAAIoE,OAAQpE,EAAIgE,SAI3E,OAHIvJ,KAAKiH,aACLjH,KAAKgH,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,IAK3B,MAAOnJ,GACL,MAAM,IAAIf,MAAM,sCAAsCe,MAI9D,oBAAMuJ,GACF,OAAO7J,KAAKmJ,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO9J,KAAKmJ,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOhK,KAAKmJ,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanK,KAAKmJ,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanK,KAAKmJ,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanK,KAAKmJ,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAItL,MAAM,2BASxB,cAAMuL,GACF,aAAa9K,KAAKmJ,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAahL,KAAKmJ,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAalL,KAAKmJ,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAapL,KAAKmJ,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBzC,GAClB,OAAQA,GACJ,KAAKqC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM5I,QAAiBH,EAAI2H,GACrB8E,QAAatM,EAASsM,OAC5B,OAAqB7C,EAAAA,GAAa5F,WAAWyI,GAC/C,MAAOC,GAEL,IACA,OAAqB9C,EAAAA,GAAaD,gBAAgB5I,KAAKmH,WAAWP,IAChE,MAAOgF,GACL,OAAO,IAAIrM,MAAM,iCAAmCqM,MAMxEC,gBAAAA,GACI,OAAO7L,KAAKmJ,iBAAiBF,EAAqBwC,gBC/hB1D,MAAMK,EACFhM,QACAiM,YACAnM,KACAoM,cACAC,eAQAlM,WAAAA,CAAYH,EAA2BmM,EAA+CE,GAClFjM,KAAKJ,KAAOA,GAAc,mCAC1BI,KAAKgM,cAAgB,IAAIrM,EAAkBK,KAAKJ,MAEhDI,KAAK+L,YAAcA,GAA4B,IAAIhF,EACnD/G,KAAKiM,eAAiBA,EAQ1BhM,UAAAA,CAAWH,GACPE,KAAKF,QAAUA,EAQnBoM,cAAAA,CAAeH,GACX/L,KAAK+L,YAAcA,EAQvB5L,OAAAA,CAAQP,GACJI,KAAKJ,KAAOA,EACZI,KAAKgM,cAAc7L,QAAQP,GAQ/BuM,iBAAAA,CAAkBF,GACdjM,KAAKiM,eAAiBA,EAkC1B,YAAMG,CACFzJ,EACA0J,EACAC,EACAC,EACAC,EACA9L,GAGA,IACI,MAAM+L,EAAgBrI,EAAAA,GAAQnB,WAAWN,GACzC,IAAI0C,EACJ,IACIA,QAAsBrF,KAAKgM,cAAcrH,WAAW8H,EAAc3G,MACpE,MAAO6F,GAEL7H,QAAQ4I,IAAe,WAAAD,EAAc3G,oDAEzC,GAA4B,iBAAjBT,EACP,KAAO,WAAWoH,EAAc3G,iEAEtC,MAAO6F,GACL,MAAMnG,EAAY,6BAA6BmG,KAInD,IAiBIgB,EAjBAC,EAAuBlM,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD8M,EAAuB5M,KAAKF,QAAQY,mBAGJ,IAAzBkM,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAK5E,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC5H,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAI3H,EACJ,IACIA,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACvD,MAAOgJ,GACL,MAAMnG,EAAY,qDAAqDmG,0GAI3E,MAAMsB,QAAWC,EAAAA,EAAmBC,2BAA2BP,EAAsBjK,EAAS0J,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+H,EAAeC,GACjJ,aAAahN,KAAKgM,cAAc9F,kBAAkB+G,GA8BtD,+BAAMG,CAA0BjO,GAE5B,MAAM,YACFkO,EAAW,aACXC,EAAY,IACZjB,EAAG,WACHC,EAAU,OACViB,EAAM,mBACNhB,EAAkB,gBAClBiB,EAAe,WACf9M,EAAU,aACV+M,GACAtO,EAEJ,IAAIqN,EAAYrN,EAAQqN,UACpBzE,EAAa5I,EAAQ4I,WACrBC,EAAe7I,EAAQ6I,aACvBrF,EAAUxD,EAAQwD,QAClBqC,EAAU7F,EAAQ6F,QAGtB,QAAgB8H,IAAZnK,EACA,IACIA,QAAyB3C,KAAKgM,cAAcrH,WAAW0I,GACzD,MAAO1B,GACL,MAAMnG,EAA6B,iBAAA6H,yBAAmC1B,2GAEnEhJ,aAAmByB,EAAAA,KAC1BzB,EAAUA,EAAQqB,YAItB,IAiBI2I,EAjBAe,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IACIlB,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAK5E,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC5H,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAK5E,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,GACpF,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,6CAMtE,GADwBvH,EAAAA,GAAQnB,WAAWN,GAASuC,aAAajD,OAC3C,IAAM+C,EACxB,IACIA,QAAgChF,KAAKgM,cAAcjH,kBAAkBsI,GACvE,MAAO1B,GACL,MAAMnG,EAAY,qDAAqDmG,0GAK/E,aAAauB,EAAAA,EAAmBE,0BAA0BM,EAAqB/K,EAAS2K,EAAcC,EAAQlB,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+C,EAAYC,EAAc+E,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQxO,GACV,MAAM8N,QAAwBjN,KAAKoN,0BAA0BjO,GAC7D,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAoCtD,SAAMW,CACFjL,EACAkL,EACAN,EACAO,EACA9I,EACAwI,EACAzF,EACAC,EACAtH,EACA+M,GAGA,IAAIC,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IAAK3F,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,GACpF,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,6CAQtE,OAHA7H,QAAQ4I,IAAI,2BACZ5I,QAAQ4I,IAAI,gBAAiB3E,GAC7BjE,QAAQ4I,IAAI,kBAAmB1E,GACxBkF,EAAAA,EAAmBa,uBAAuBL,EAAqB/K,EAASkL,EAAeN,EAAQO,GAAgB,EAAO9I,EAAS+C,EAAYC,EAAchI,KAAKJ,KAAM6N,GAiB/K,UAAM1C,CACFiD,EACAC,EACA5B,EACAC,EACAC,EACAC,EACA9L,EACA+M,GAGA,IAUId,EACA7B,EAXA4C,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HN,QAAkC9K,KAAK+L,YAAYjB,WACrD,MAAOa,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,GAClCuB,EAAgBC,GAAoBrD,EAG3C,IACI0B,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAI5E,IACIqC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBnL,WAAW+K,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBnL,WAAWgL,GAC5F,MAAOtC,GACL,MAAMnG,EAAY,mFAItB,MAAMyH,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW5B,EAAKG,EAAWxM,KAAKJ,KAAMsO,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,WAAMhC,CAAMqD,EAAqBC,EAAwC7N,EAAyB+M,GAE9F,IAUIzC,EAVA0C,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAKV,IACI1C,QAAmChL,KAAK+L,YAAYf,YACtD,MAAOW,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAO6C,EAAiBC,GAAqBzD,EAG7C,IACIuD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBnL,WAAWsL,GACrG,MAAO5C,GACL,MAAMnG,EAAY,+EAItB,MAAMyH,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcvO,KAAKJ,KAAM4O,EAAiBC,EAAmBhB,GACzJ,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAatD,oBAAM0B,CACFhM,EACAiM,EACArB,EACA7M,GAGA,IAAIsE,EAEA0I,EAAsBhN,OACS,IAAxBgN,IAEHA,OADwB,IAAjB1N,KAAKF,QACUE,KAAKF,QAAQY,aAEb,IAAIc,EAAAA,IAKlC,IACIwD,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACrD,MAAM6G,QAAgB0D,EAAAA,EAAmB2B,kBACrCnB,EACA/K,EACAiM,EACArB,EACAvI,GAEJ,MAAO,CAAawE,EAAQzB,aAA4ByB,EAAQxB,gBAClE,MAAO2D,GACL,MAAMnG,EAAY,qCAAqCmG,sEAiC/D,8BAAMmD,CACFC,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUItC,EACAzC,EAXAwD,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HlB,QAAsClK,KAAK+L,YAAY7B,aAAa+E,GACtE,MAAOtD,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,GAClCwC,EAAoBC,GAAwBlF,EAGnD,IAEI,MAAMrJ,EAAmB,GACrBwO,EAAqBJ,IAErBV,QAAsCvO,KAAK6M,iBAAiBR,EAAK,GAAIkC,EAAchC,GACnF1L,EAAO8C,KAAK4K,EAAajL,UAEzBiL,OAAezB,EAEnBN,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAKxL,EAAQ2L,EAAWD,QAAsBO,EACtH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAI5E,aAAauB,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAclC,EAAKG,EAAWxM,KAAKJ,KAAMuP,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GAmB/H,4CAAM8B,CACFR,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAEA,MAAMR,QAAwBjN,KAAK8O,yBAAyBC,EAAQC,EAAWC,EAAc5C,EAAKC,EAAYC,EAAoBgC,EAAc/B,EAAW9L,EAAY+M,GACvK,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB5P,EAAmC,CAAC,GAChK,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa7L,iBAAgB,gBACjGwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBW,YAAYD,OAC5C/C,YAAaqC,EAAqBW,YAAY0B,SAC9CzE,SAAU,6BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB5P,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKyP,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ5P,GAC7H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/J,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa7L,gBAAiB,GAAGsM,EAAmBtM,gBAAe,gBACvHwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBc,eAAeJ,OAC/C/C,YAAaqC,EAAqBc,eAAeuB,SACjDzE,SAAU,gCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKoQ,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYlR,GAC5H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3G,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BjB,EAAMlN,EAAQkN,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgB,GAAGG,EAAa7L,iBAAgB,gBAC1DwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBwC,cAAc9B,OAC9C/C,YAAaqC,EAAqBwC,cAAcH,SAChDzE,SAAU,+BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,OAAOjQ,KAAKoN,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3F,MAAM8N,QAAwBjN,KAAKwQ,6BAA6Bd,EAAgBX,EAAQ5P,GACxF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,uCAAMyD,CAAkChB,EAAwBvQ,EAAmC,CAAC,GAChG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAMlN,EAAQkN,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBgB,oBAAoBN,OACpD/C,YAAaqC,EAAqBgB,oBAAoBqB,SACtDzE,SAAU,qCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwBvQ,EAAmC,CAAC,GAChF,MAAM8N,QAAwBjN,KAAK0Q,kCAAkChB,EAAgBvQ,GACrF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,uCAAM2D,CAAkCC,EAA0B1R,EAAmC,CAAC,GAClG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBiB,EAAS,CAACsD,EAAgB7M,YAAW,gBACrCwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBuC,oBAAoB7B,OACpD/C,YAAaqC,EAAqBuC,oBAAoBF,SACtDzE,SAAU,wCAEXoJ,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAK2N,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B1R,EAAmC,CAAC,GAClF,MAAM8N,QAAmBjN,KAAK4Q,kCAAkCC,EAAiB1R,GACjF,OAAOa,KAAKgM,cAAc9F,kBAAkB+G,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMzO,EAAuByO,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCvO,EAAUqO,EAAkBrM,aAC5BqD,EAAegJ,EAAkB3H,kBACvC,OAAO8H,EAAAA,EAAAA,IAAwB5O,EAAWyF,EAAcrF,EAASiM,GACnE,MAAMjD,GAEJ,OADA7H,QAAQC,KAAK,6EACN,GAUfqN,uBAAAA,CAAwBzO,GACpB,OAAOyB,EAAAA,GAAQnB,WAAWN,GAQ9BqN,cAAAA,GACI,OAAO5L,EAAAA,GAAQiN,oBAQnBC,aAAAA,CAAc3O,GACV,IAEI,OADSyB,EAAAA,GAAQnB,WAAWN,IACrB,EACT,MAAOgJ,GACL,OAAO,GAKf,sBAAMkB,CAAiBkC,EAAgBlO,EAAkBkC,EAAmC+D,GACxF,IACI,OAAO/D,aAAkBqL,EAAAA,GAAkBrL,EAASqL,EAAAA,GAAgBnL,WAAmBF,GACzF,MAAO4I,GACL,IACI,MAAMM,EAAiCjM,KAAKiM,eAC5C,aAA+BA,EAAesF,kBAAkBxC,GAAQ,EAAMlO,EAAQiG,GACxF,MAAO6E,GACL,MAAMnG,EAAY,sDAAsDmG,0GAOxF,SAAS0D,EAAqBJ,GAC1B,OAAOuC,EAAuBpJ,IAAI6G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOwC,EAAqBrJ,IAAI6G,GAAgBA,EAC5CzJ,EAAY,0BAA0ByJ,8FAC9C,CCjwCA,MAAM1H,EAAYmK,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAM7J,EAAgBa,EAAAA,GAAqBgJ,EAAS7J,cAEpD,IAAKA,EACD,MAAM,IAAIzI,MAAM,wBAA0BsS,EAAS7J,cAGvD,MAAO,CACHtB,KAAMmL,EAASnL,KACf6C,QAASsI,EAAStI,QAClBI,OAAQkI,EAASlI,OACjB2B,SAAUuG,EAASvG,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAagI,EAAQF,EAAAA,GAAS9H,eAC9BG,eAAgB6H,EAAQF,EAAAA,GAAS3H,kBACjCE,oBAAqB2H,EAAQF,EAAAA,GAASzH,uBACtCkB,YAAayG,EAAQF,EAAAA,GAASvG,eAC9BE,WAAYuG,EAAQF,EAAAA,GAASrG,cAC7BE,UAAWqG,EAAQF,EAAAA,GAASnG,aAC5BR,KAAM6G,EAAQF,EAAAA,GAAS3G,QACvBS,oBAAqBoG,EAAQF,EAAAA,GAASlG,uBACtCP,MAAO2G,EAAQF,EAAAA,GAASzG,SACxBZ,iBAAkBuH,EAAQF,EAAAA,GAASrH,oBACnCE,2BAA4BqH,EAAQF,EAAAA,GAASnH,8BAC7CE,gBAAiBmH,EAAQF,EAAAA,GAASjH,mBAClCE,0BAA2BiH,EAAQF,EAAAA,GAAS/G,6BAC5CE,2BAA4B+G,EAAQF,EAAAA,GAAS7G,8BAC7CY,cAAemG,EAAQF,EAAAA,GAASjG,iBAChCvC,OAAQ,SAAS3D,GACb,OAAIvF,KAAKoF,eAAeG,GACZvF,KAAauF,GAEd,IAAIhG,MAAM,QAAQgG,mBAK/BiM,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE1H,EAAmB,IAAI0H,IAAI,CAC7B,UACA,mBACA,oBAEExH,EAA6B,IAAIwH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEtH,EAAkB,IAAIsH,IAAI,CAC5B,SACA,kBACA,mBAEEpH,EAA4B,IAAIoH,IAAI,CACtC,mBACA,4BACA,2BAEElH,EAA6B,IAAIkH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAStM,EAAYgB,GAEjB,MADA1C,QAAQxD,MAAMkG,GACRA,CACV,szCC9GAuL,EAAA,kBAAApG,CAAA,MAAAqG,EAAArG,EAAA,GAAAsG,EAAA3L,OAAA4L,UAAAC,EAAAF,EAAA7M,eAAAgN,EAAA9L,OAAA+L,gBAAA,SAAAL,EAAArG,EAAAsG,GAAAD,EAAArG,GAAAsG,EAAA/O,KAAA,EAAAlB,EAAA,mBAAAsQ,OAAAA,OAAA,GAAAC,EAAAvQ,EAAAwQ,UAAA,aAAAC,EAAAzQ,EAAA0Q,eAAA,kBAAAC,EAAA3Q,EAAA4Q,aAAA,yBAAAC,EAAAb,EAAArG,EAAAsG,GAAA,OAAA3L,OAAA+L,eAAAL,EAAArG,EAAA,CAAAzI,MAAA+O,EAAAa,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAAhB,EAAArG,EAAA,KAAAkH,EAAA,aAAAb,GAAAa,EAAA,SAAAb,EAAArG,EAAAsG,GAAA,OAAAD,EAAArG,GAAAsG,CAAA,WAAAgB,EAAAjB,EAAArG,EAAAsG,EAAAE,GAAA,IAAAnQ,EAAA2J,GAAAA,EAAAuG,qBAAAgB,EAAAvH,EAAAuH,EAAAX,EAAAjM,OAAA6M,OAAAnR,EAAAkQ,WAAAO,EAAA,IAAAW,EAAAjB,GAAA,WAAAC,EAAAG,EAAA,WAAArP,MAAAmQ,EAAArB,EAAAC,EAAAQ,KAAAF,CAAA,UAAAe,EAAAtB,EAAArG,EAAAsG,GAAA,WAAA5P,KAAA,SAAAkR,IAAAvB,EAAAwB,KAAA7H,EAAAsG,GAAA,OAAAD,GAAA,OAAA3P,KAAA,QAAAkR,IAAAvB,EAAA,EAAArG,EAAAsH,KAAAA,EAAA,IAAAQ,EAAA,iBAAA5Q,EAAA,iBAAA6Q,EAAA,YAAAC,EAAA,YAAAC,EAAA,YAAAV,IAAA,UAAAW,IAAA,UAAAC,IAAA,KAAAC,EAAA,GAAAlB,EAAAkB,EAAAxB,GAAA,8BAAAyB,EAAA1N,OAAA2N,eAAAC,EAAAF,GAAAA,EAAAA,EAAAG,EAAA,MAAAD,GAAAA,IAAAjC,GAAAE,EAAAqB,KAAAU,EAAA3B,KAAAwB,EAAAG,GAAA,IAAAE,EAAAN,EAAA5B,UAAAgB,EAAAhB,UAAA5L,OAAA6M,OAAAY,GAAA,SAAAM,EAAArC,GAAA,0BAAAsC,SAAA,SAAA3I,GAAAkH,EAAAb,EAAArG,GAAA,SAAAqG,GAAA,YAAAuC,QAAA5I,EAAAqG,EAAA,gBAAAwC,EAAAxC,EAAArG,GAAA,SAAA8I,EAAAxC,EAAAG,EAAApQ,EAAAuQ,GAAA,IAAAE,EAAAa,EAAAtB,EAAAC,GAAAD,EAAAI,GAAA,aAAAK,EAAApQ,KAAA,KAAAsQ,EAAAF,EAAAc,IAAAE,EAAAd,EAAAzP,MAAA,OAAAuQ,GAAA,UAAAiB,EAAAjB,IAAAtB,EAAAqB,KAAAC,EAAA,WAAA9H,EAAAgJ,QAAAlB,EAAAmB,SAAAC,MAAA,SAAA7C,GAAAyC,EAAA,OAAAzC,EAAAhQ,EAAAuQ,EAAA,aAAAP,GAAAyC,EAAA,QAAAzC,EAAAhQ,EAAAuQ,EAAA,IAAA5G,EAAAgJ,QAAAlB,GAAAoB,MAAA,SAAA7C,GAAAW,EAAAzP,MAAA8O,EAAAhQ,EAAA2Q,EAAA,aAAAX,GAAA,OAAAyC,EAAA,QAAAzC,EAAAhQ,EAAAuQ,EAAA,IAAAA,EAAAE,EAAAc,IAAA,KAAAtB,EAAAG,EAAA,gBAAAlP,MAAA,SAAA8O,EAAAG,GAAA,SAAA2C,IAAA,WAAAnJ,GAAA,SAAAA,EAAAsG,GAAAwC,EAAAzC,EAAAG,EAAAxG,EAAAsG,EAAA,WAAAA,EAAAA,EAAAA,EAAA4C,KAAAC,EAAAA,GAAAA,GAAA,aAAAzB,EAAA1H,EAAAsG,EAAAE,GAAA,IAAAC,EAAAqB,EAAA,gBAAAzR,EAAAuQ,GAAA,GAAAH,IAAAsB,EAAA,UAAAnU,MAAA,mCAAA6S,IAAAuB,EAAA,cAAA3R,EAAA,MAAAuQ,EAAA,OAAArP,MAAA8O,EAAA+C,MAAA,OAAA5C,EAAAzS,OAAAsC,EAAAmQ,EAAAoB,IAAAhB,IAAA,KAAAE,EAAAN,EAAA6C,SAAA,GAAAvC,EAAA,KAAAE,EAAAsC,EAAAxC,EAAAN,GAAA,GAAAQ,EAAA,IAAAA,IAAAiB,EAAA,gBAAAjB,CAAA,cAAAR,EAAAzS,OAAAyS,EAAA+C,KAAA/C,EAAAgD,MAAAhD,EAAAoB,SAAA,aAAApB,EAAAzS,OAAA,IAAA0S,IAAAqB,EAAA,MAAArB,EAAAuB,EAAAxB,EAAAoB,IAAApB,EAAAiD,kBAAAjD,EAAAoB,IAAA,gBAAApB,EAAAzS,QAAAyS,EAAAkD,OAAA,SAAAlD,EAAAoB,KAAAnB,EAAAsB,EAAA,IAAAK,EAAAT,EAAA3H,EAAAsG,EAAAE,GAAA,cAAA4B,EAAA1R,KAAA,IAAA+P,EAAAD,EAAA4C,KAAApB,EAAA9Q,EAAAkR,EAAAR,MAAAK,EAAA,gBAAA1Q,MAAA6Q,EAAAR,IAAAwB,KAAA5C,EAAA4C,KAAA,WAAAhB,EAAA1R,OAAA+P,EAAAuB,EAAAxB,EAAAzS,OAAA,QAAAyS,EAAAoB,IAAAQ,EAAAR,IAAA,YAAA0B,EAAAtJ,EAAAsG,GAAA,IAAAE,EAAAF,EAAAvS,OAAA0S,EAAAzG,EAAA6G,SAAAL,GAAA,GAAAC,IAAAJ,EAAA,OAAAC,EAAA+C,SAAA,eAAA7C,GAAAxG,EAAA6G,SAAA,SAAAP,EAAAvS,OAAA,SAAAuS,EAAAsB,IAAAvB,EAAAiD,EAAAtJ,EAAAsG,GAAA,UAAAA,EAAAvS,SAAA,WAAAyS,IAAAF,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAA,IAAA+B,UAAA,oCAAAnD,EAAA,aAAAyB,EAAA,IAAA5R,EAAAsR,EAAAlB,EAAAzG,EAAA6G,SAAAP,EAAAsB,KAAA,aAAAvR,EAAAK,KAAA,OAAA4P,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAAvR,EAAAuR,IAAAtB,EAAA+C,SAAA,KAAApB,EAAA,IAAArB,EAAAvQ,EAAAuR,IAAA,OAAAhB,EAAAA,EAAAwC,MAAA9C,EAAAtG,EAAA4J,YAAAhD,EAAArP,MAAA+O,EAAAuD,KAAA7J,EAAA8J,QAAA,WAAAxD,EAAAvS,SAAAuS,EAAAvS,OAAA,OAAAuS,EAAAsB,IAAAvB,GAAAC,EAAA+C,SAAA,KAAApB,GAAArB,GAAAN,EAAAvS,OAAA,QAAAuS,EAAAsB,IAAA,IAAA+B,UAAA,oCAAArD,EAAA+C,SAAA,KAAApB,EAAA,UAAA8B,EAAA1D,GAAA,IAAArG,EAAA,CAAAgK,OAAA3D,EAAA,SAAAA,IAAArG,EAAAiK,SAAA5D,EAAA,SAAAA,IAAArG,EAAAkK,WAAA7D,EAAA,GAAArG,EAAAmK,SAAA9D,EAAA,SAAA+D,WAAApS,KAAAgI,EAAA,UAAAqK,EAAAhE,GAAA,IAAArG,EAAAqG,EAAAiE,YAAA,GAAAtK,EAAAtJ,KAAA,gBAAAsJ,EAAA4H,IAAAvB,EAAAiE,WAAAtK,CAAA,UAAAyH,EAAApB,GAAA,KAAA+D,WAAA,EAAAJ,OAAA,SAAA3D,EAAAsC,QAAAoB,EAAA,WAAAQ,OAAA,YAAA/B,EAAAxI,GAAA,GAAAA,GAAA,KAAAA,EAAA,KAAAsG,EAAAtG,EAAA4G,GAAA,GAAAN,EAAA,OAAAA,EAAAuB,KAAA7H,GAAA,sBAAAA,EAAA6J,KAAA,OAAA7J,EAAA,IAAAwK,MAAAxK,EAAA1J,QAAA,KAAAmQ,GAAA,EAAApQ,EAAA,SAAAwT,IAAA,OAAApD,EAAAzG,EAAA1J,QAAA,GAAAkQ,EAAAqB,KAAA7H,EAAAyG,GAAA,OAAAoD,EAAAtS,MAAAyI,EAAAyG,GAAAoD,EAAAT,MAAA,EAAAS,EAAA,OAAAA,EAAAtS,MAAA8O,EAAAwD,EAAAT,MAAA,EAAAS,CAAA,SAAAxT,EAAAwT,KAAAxT,CAAA,YAAAsT,UAAAZ,EAAA/I,GAAA,2BAAAkI,EAAA3B,UAAA4B,EAAA1B,EAAAgC,EAAA,eAAAlR,MAAA4Q,EAAAf,cAAA,IAAAX,EAAA0B,EAAA,eAAA5Q,MAAA2Q,EAAAd,cAAA,IAAAc,EAAAuC,YAAAvD,EAAAiB,EAAAnB,EAAA,qBAAAhH,EAAA0K,oBAAA,SAAArE,GAAA,IAAArG,EAAA,mBAAAqG,GAAAA,EAAAjS,YAAA,QAAA4L,IAAAA,IAAAkI,GAAA,uBAAAlI,EAAAyK,aAAAzK,EAAAjF,MAAA,EAAAiF,EAAA2K,KAAA,SAAAtE,GAAA,OAAA1L,OAAAiQ,eAAAjQ,OAAAiQ,eAAAvE,EAAA8B,IAAA9B,EAAAwE,UAAA1C,EAAAjB,EAAAb,EAAAW,EAAA,sBAAAX,EAAAE,UAAA5L,OAAA6M,OAAAiB,GAAApC,CAAA,EAAArG,EAAA8K,MAAA,SAAAzE,GAAA,OAAA4C,QAAA5C,EAAA,EAAAqC,EAAAG,EAAAtC,WAAAW,EAAA2B,EAAAtC,UAAAO,GAAA,0BAAA9G,EAAA6I,cAAAA,EAAA7I,EAAA3M,MAAA,SAAAgT,EAAAC,EAAAE,EAAAC,EAAApQ,QAAA,IAAAA,IAAAA,EAAA0U,SAAA,IAAAnE,EAAA,IAAAiC,EAAAvB,EAAAjB,EAAAC,EAAAE,EAAAC,GAAApQ,GAAA,OAAA2J,EAAA0K,oBAAApE,GAAAM,EAAAA,EAAAiD,OAAAX,MAAA,SAAA7C,GAAA,OAAAA,EAAA+C,KAAA/C,EAAA9O,MAAAqP,EAAAiD,MAAA,KAAAnB,EAAAD,GAAAvB,EAAAuB,EAAAzB,EAAA,aAAAE,EAAAuB,EAAA7B,GAAA,0BAAAM,EAAAuB,EAAA,qDAAAzI,EAAA7D,KAAA,SAAAkK,GAAA,IAAArG,EAAArF,OAAA0L,GAAAC,EAAA,WAAAE,KAAAxG,EAAAsG,EAAAtO,KAAAwO,GAAA,OAAAF,EAAA0E,UAAA,SAAAnB,IAAA,KAAAvD,EAAAhQ,QAAA,KAAA+P,EAAAC,EAAA2E,MAAA,GAAA5E,KAAArG,EAAA,OAAA6J,EAAAtS,MAAA8O,EAAAwD,EAAAT,MAAA,EAAAS,CAAA,QAAAA,EAAAT,MAAA,EAAAS,CAAA,GAAA7J,EAAAwI,OAAAA,EAAAf,EAAAlB,UAAA,CAAAnS,YAAAqT,EAAA8C,MAAA,SAAAvK,GAAA,QAAAkL,KAAA,OAAArB,KAAA,OAAAN,KAAA,KAAAC,MAAAnD,EAAA,KAAA+C,MAAA,OAAAC,SAAA,UAAAtV,OAAA,YAAA6T,IAAAvB,EAAA,KAAA+D,WAAAzB,QAAA0B,IAAArK,EAAA,QAAAsG,KAAA,WAAAA,EAAA6E,OAAA,IAAA3E,EAAAqB,KAAA,KAAAvB,KAAAkE,OAAAlE,EAAA8E,MAAA,WAAA9E,GAAAD,EAAA,EAAAgF,KAAA,gBAAAjC,MAAA,MAAA/C,EAAA,KAAA+D,WAAA,GAAAE,WAAA,aAAAjE,EAAA3P,KAAA,MAAA2P,EAAAuB,IAAA,YAAA0D,IAAA,EAAA7B,kBAAA,SAAAzJ,GAAA,QAAAoJ,KAAA,MAAApJ,EAAA,IAAAsG,EAAA,cAAAiF,EAAA/E,EAAAC,GAAA,OAAAG,EAAAlQ,KAAA,QAAAkQ,EAAAgB,IAAA5H,EAAAsG,EAAAuD,KAAArD,EAAAC,IAAAH,EAAAvS,OAAA,OAAAuS,EAAAsB,IAAAvB,KAAAI,CAAA,SAAAA,EAAA,KAAA2D,WAAA9T,OAAA,EAAAmQ,GAAA,IAAAA,EAAA,KAAApQ,EAAA,KAAA+T,WAAA3D,GAAAG,EAAAvQ,EAAAiU,WAAA,YAAAjU,EAAA2T,OAAA,OAAAuB,EAAA,UAAAlV,EAAA2T,QAAA,KAAAkB,KAAA,KAAApE,EAAAN,EAAAqB,KAAAxR,EAAA,YAAA2Q,EAAAR,EAAAqB,KAAAxR,EAAA,iBAAAyQ,GAAAE,EAAA,SAAAkE,KAAA7U,EAAA4T,SAAA,OAAAsB,EAAAlV,EAAA4T,UAAA,WAAAiB,KAAA7U,EAAA6T,WAAA,OAAAqB,EAAAlV,EAAA6T,WAAA,SAAApD,GAAA,QAAAoE,KAAA7U,EAAA4T,SAAA,OAAAsB,EAAAlV,EAAA4T,UAAA,YAAAjD,EAAA,UAAApT,MAAA,kDAAAsX,KAAA7U,EAAA6T,WAAA,OAAAqB,EAAAlV,EAAA6T,WAAA,KAAAR,OAAA,SAAArD,EAAArG,GAAA,QAAAsG,EAAA,KAAA8D,WAAA9T,OAAA,EAAAgQ,GAAA,IAAAA,EAAA,KAAAG,EAAA,KAAA2D,WAAA9D,GAAA,GAAAG,EAAAuD,QAAA,KAAAkB,MAAA1E,EAAAqB,KAAApB,EAAA,oBAAAyE,KAAAzE,EAAAyD,WAAA,KAAA7T,EAAAoQ,EAAA,OAAApQ,IAAA,UAAAgQ,GAAA,aAAAA,IAAAhQ,EAAA2T,QAAAhK,GAAAA,GAAA3J,EAAA6T,aAAA7T,EAAA,UAAAuQ,EAAAvQ,EAAAA,EAAAiU,WAAA,UAAA1D,EAAAlQ,KAAA2P,EAAAO,EAAAgB,IAAA5H,EAAA3J,GAAA,KAAAtC,OAAA,YAAA8V,KAAAxT,EAAA6T,WAAAjC,GAAA,KAAAuD,SAAA5E,EAAA,EAAA4E,SAAA,SAAAnF,EAAArG,GAAA,aAAAqG,EAAA3P,KAAA,MAAA2P,EAAAuB,IAAA,gBAAAvB,EAAA3P,MAAA,aAAA2P,EAAA3P,KAAA,KAAAmT,KAAAxD,EAAAuB,IAAA,WAAAvB,EAAA3P,MAAA,KAAA4U,KAAA,KAAA1D,IAAAvB,EAAAuB,IAAA,KAAA7T,OAAA,cAAA8V,KAAA,kBAAAxD,EAAA3P,MAAAsJ,IAAA,KAAA6J,KAAA7J,GAAAiI,CAAA,EAAAwD,OAAA,SAAApF,GAAA,QAAArG,EAAA,KAAAoK,WAAA9T,OAAA,EAAA0J,GAAA,IAAAA,EAAA,KAAAsG,EAAA,KAAA8D,WAAApK,GAAA,GAAAsG,EAAA4D,aAAA7D,EAAA,YAAAmF,SAAAlF,EAAAgE,WAAAhE,EAAA6D,UAAAE,EAAA/D,GAAA2B,CAAA,kBAAA5B,GAAA,QAAArG,EAAA,KAAAoK,WAAA9T,OAAA,EAAA0J,GAAA,IAAAA,EAAA,KAAAsG,EAAA,KAAA8D,WAAApK,GAAA,GAAAsG,EAAA0D,SAAA3D,EAAA,KAAAG,EAAAF,EAAAgE,WAAA,aAAA9D,EAAA9P,KAAA,KAAA+P,EAAAD,EAAAoB,IAAAyC,EAAA/D,EAAA,QAAAG,CAAA,YAAA7S,MAAA,0BAAA8X,cAAA,SAAA1L,EAAAsG,EAAAE,GAAA,YAAA6C,SAAA,CAAAxC,SAAA2B,EAAAxI,GAAA4J,WAAAtD,EAAAwD,QAAAtD,GAAA,cAAAzS,SAAA,KAAA6T,IAAAvB,GAAA4B,CAAA,GAAAjI,CAAA,UAAA2L,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAAnS,EAAAgO,GAAA,QAAAoE,EAAAJ,EAAAhS,GAAAgO,GAAArQ,EAAAyU,EAAAzU,KAAA,OAAA5C,GAAA,YAAAkX,EAAAlX,EAAA,CAAAqX,EAAA5C,KAAAJ,EAAAzR,GAAAwT,QAAA/B,QAAAzR,GAAA2R,KAAA4C,EAAAC,EAAA,UAAAE,EAAAC,GAAA,sBAAAC,EAAA,KAAAC,EAAAC,UAAA,WAAAtB,SAAA,SAAA/B,EAAA6C,GAAA,IAAAD,EAAAM,EAAAI,MAAAH,EAAAC,GAAA,SAAAN,EAAAvU,GAAAoU,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAA,OAAAxU,EAAA,UAAAwU,EAAAQ,GAAAZ,EAAAC,EAAA5C,EAAA6C,EAAAC,EAAAC,EAAA,QAAAQ,EAAA,CAAAT,OAAA3K,EAAA,uCACMqL,EAAAA,iBAEN,IAAMC,EAAc,mCACdrM,EAAc,IAAIoM,EAAAA,gBAClBE,EAAiB,IAAIF,EAAAA,eAAoBC,EAAarM,OAAae,GACzEf,EAAYtE,UAAS,GAErBqQ,KAAKQ,YAAY,CACbjW,KAAM,sBAGV,IAAIkW,EAAmB,KACvBT,KAAKU,iBAAiB,WAAW,SAACC,GAC9B,GAAqB,+BAAjBA,EAAGrR,KAAK/E,KAAuC,CAC/C,IAAAqW,EAA2DD,EAAGrR,KAAtDuR,EAAYD,EAAZC,aAAcC,EAAYF,EAAZE,aAAcrL,EAAMmL,EAANnL,OAAQ7M,EAAUgY,EAAVhY,WAE5CoD,QAAQ4I,IAAI,6CACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA0C,IAAA,IAAAC,EAAAtW,EAAAuW,EAAArS,EAAA7B,EAAA8C,EAAAqR,EAAA/Z,EAAAwD,EAAAL,EAAA,OAAAwP,IAAAkB,MAAA,SAAAmG,GAAA,cAAAA,EAAAvC,KAAAuC,EAAA5D,MAAA,OAKsC,GALtC4D,EAAAvC,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GAE/CiC,EAAU0V,EAAejH,wBAAwBuH,GACjDO,EAAavW,EAAQmD,KACtBnD,EAAQ0W,YAAYT,GAAe,CAAFQ,EAAA5D,KAAA,wBAAA8D,OACjBJ,EAAU,+BAAAI,OAA8BV,GAAY,OAOzE,GALM/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAG5B5T,EAAUqT,EAAerM,cAAcjH,kBAAkB4T,GAG3DJ,IAAqBI,EAAY,CAAAS,EAAA5D,KAAA,gBAAA4D,EAAA5D,KAAA,GACd6C,EAAe1J,eAAegK,EAAcC,EAAcrL,EAAQ0L,GAAiB,QAAhGnR,EAAIsR,EAAAlE,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAC/CyQ,EAAmBI,EAAa,QAMpC,OAFMQ,EAAY,IAAIhB,EAAAA,sBAA2B,CAAC,SAAYtR,IAE9DuS,EAAA5D,KAAA,GACqB6C,EAAezK,IAChC+K,EACAC,EACArL,GACA,EACAvI,EACAmU,OACArM,OACAA,EACAmM,OACAnM,GACH,QAXG1N,EAAQga,EAAAlE,KAcZpR,QAAQ4I,IAAI,4CAAD4M,OAA6CR,YAAYC,MAAQF,EAAS,QAC/EjW,EAAUxD,EAASma,cACrBhX,EAAYnD,EAAS6R,iBAErBkH,EAAAA,wBAA6B5V,EAAWwJ,EAAYxD,QAAQ1B,GAAU,GAAIlE,EAAS,SACnFJ,EAAYA,EAAUyB,WACtBF,QAAQ4I,IAAI,oCAAsCnK,IAElDA,EAAY,GAGhBuB,QAAQ4I,IAAI,gCAAD4M,OAAiC1W,IAC5CkV,KAAKQ,YAAY,CACbjW,KAAM,8BACNO,QAAS,CAACA,QAASA,EAASL,UAAWA,KACxC6W,EAAA5D,KAAA,iBAAA4D,EAAAvC,KAAA,GAAAuC,EAAAI,GAAAJ,EAAA,SAEHtV,QAAQxD,MAAK8Y,EAAAI,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcL,EAAAI,GAAMxV,aACrB,yBAAAoV,EAAApC,OAAA,GAAAgC,EAAA,kBA5DXpB,EA+DJ,MAAO,GAAqB,kCAAjBa,EAAGrR,KAAK/E,KAA0C,CACzD,IAAAqX,EASIjB,EAAGrR,KARHuS,EAAaD,EAAbC,cACAf,EAAYc,EAAZd,aACArL,EAAMmM,EAANnM,OACA7M,EAAUgZ,EAAVhZ,WACA2L,EAAGqN,EAAHrN,IACAC,EAAUoN,EAAVpN,WACAE,EAASkN,EAATlN,UACAtN,EAAGwa,EAAHxa,IAGJ4E,QAAQ4I,IAAI,qCACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAAsD,IAAA,IAAAX,EAAAtW,EAAAuW,EAAArS,EAAAiB,EAAAqR,EAAA7W,EAAA,OAAAyP,IAAAkB,MAAA,SAAA4G,GAAA,cAAAA,EAAAhD,KAAAgD,EAAArE,MAAA,OAGO,OAHPqE,EAAAhD,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GACrDmZ,EAAArE,KAAA,EACsB6C,EAAerM,cAAcnH,iBAAiB8U,GAAc,OACnD,GADzBhX,EAAOkX,EAAA3E,KACPgE,EAAavW,EAAQmD,KACtBnD,EAAQ0W,YAAYT,GAAe,CAAFiB,EAAArE,KAAA,wBAAA8D,OACjBJ,EAAU,+BAAAI,OAA8BV,GAAY,OAI3B,GAAxC/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAC7BP,EAAetM,YAAY5D,aAAatB,GAAW,CAAFgT,EAAArE,KAAA,SACoD,OAAtG1R,QAAQ4I,IAAI,2DAAD4M,OAA4DJ,EAAU,KAAAI,OAAIV,EAAY,MAAKiB,EAAArE,KAAA,GACnF6C,EAAe1J,eAAegL,EAAef,EAAcrL,EAAQ0L,GAAiB,QAAjGnR,EAAI+R,EAAA3E,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAAM,QAOI,OAHvDqR,EAAY,IAAIhB,EAAAA,sBAA2B,CAAC,SAAYtR,IAG3C,iBAAR3H,GAAoBmZ,EAAelY,QAAQjB,GAAO2a,EAAArE,KAAA,GACnC6C,EAAe1K,QAAQ,CAC7CN,YAAa6L,EACb5L,aAAcsL,EACdvM,IAAKA,EACLC,WAAYA,EACZiB,OAAQA,EACRC,gBAAiB2L,EACjB3M,UAAWA,EACX9L,WAAYuY,IACd,QATI3W,EAAWuX,EAAA3E,KAYjBpR,QAAQ4I,IAAI,yDAAD4M,OAA0DR,YAAYC,MAAQF,EAAS,QAClGf,KAAKQ,YAAY,CACbjW,KAAM,kCACNyX,mBAAoBxX,IACrBuX,EAAArE,KAAA,iBAAAqE,EAAAhD,KAAA,GAAAgD,EAAAL,GAAAK,EAAA,SAEH/V,QAAQxD,MAAM,yCAADgZ,OAAAO,EAAAL,KACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcI,EAAAL,GAAMxV,aACrB,QAEiC,OAFjC6V,EAAAhD,KAAA,GAEHwB,EAAelY,QAAQiY,GAAayB,EAAAzC,OAAA,6BAAAyC,EAAA7C,OAAA,GAAA4C,EAAA,wBA/C5ChC,EAkDJ,MAAO,GAAqB,gCAAjBa,EAAGrR,KAAK/E,KAAwC,CACvD,IAAA0X,EACItB,EAAGrR,KADCuS,EAAaI,EAAbJ,cAAejZ,EAAUqZ,EAAVrZ,WAAYkY,EAAYmB,EAAZnB,aAAcrL,EAAMwM,EAANxM,OAAQrO,EAAG6a,EAAH7a,IAGzD4E,QAAQ4I,IAAI,2CACZ,IAAImM,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA0D,IAAA,IAAAf,EAAAtW,EAAAuW,EAAArS,EAAA7B,EAAA8C,EAAAmS,EAAAC,EAAAnS,EAAAC,EAAAmS,EAAA,OAAApI,IAAAkB,MAAA,SAAAmH,GAAA,cAAAA,EAAAvD,KAAAuD,EAAA5E,MAAA,OAGO,OAHP4E,EAAAvD,KAAA,EAEaoC,EAAmBd,EAAAA,WAAgB1W,YAAYf,GACrD0Z,EAAA5E,KAAA,EACsB6C,EAAerM,cAAcnH,iBAAiB8U,GAAc,OACnD,GADzBhX,EAAOyX,EAAAlF,KACPgE,EAAavW,EAAQmD,KACtBnD,EAAQ0X,eAAe9W,SAASqV,GAAe,CAAFwB,EAAA5E,KAAA,wBAAA8D,OAC7BJ,EAAU,+BAAAI,OAA8BV,GAAY,OAE3B,OAAxC/R,EAAW,GAAHyS,OAAMJ,EAAU,KAAAI,OAAIV,GAAYwB,EAAA5E,KAAA,GACxB6C,EAAerM,cAAcjH,kBAAkB4U,GAAc,QAAtE,GAAP3U,EAAOoV,EAAAlF,KAGRmD,EAAetM,YAAY5D,aAAatB,GAAW,CAAFuT,EAAA5E,KAAA,SACoD,OAAtG1R,QAAQ4I,IAAI,2DAAD4M,OAA4DJ,EAAU,KAAAI,OAAIV,EAAY,MAAKwB,EAAA5E,KAAA,GACnF6C,EAAe1J,eAAehM,EAAQqB,WAAY4U,EAAcrL,EAAQ0L,GAAiB,QAAtGnR,EAAIsS,EAAAlF,KACVmD,EAAetM,YAAYnE,UAAUf,EAAUiB,GAAM,QAI1B,OAD/BmS,EACmC5B,EAAetM,YAAYxD,QAAQ1B,KAAS,EAAAqT,MAAAD,wBAAxElS,EAAUmS,EAAA,GAAElS,EAAYkS,EAAA,GAAAE,EAAA5E,KAAA,GACR2C,EAAAA,mBAAwBmC,qBAC3CrB,EACAU,EACAf,EACArL,EACArO,EACA8F,EACA+C,EACAC,OACA8E,GACH,QAVGqN,EAAUC,EAAAlF,KAadpR,QAAQ4I,IAAI,0CAAD4M,OAA2CR,YAAYC,MAAQF,EAAS,QACnF/U,QAAQ4I,IAAI,6BAAD4M,OAA8Ba,EAAU,kBACnDrC,KAAKQ,YAAY,CACbjW,KAAM,qCACNkY,aAAcC,OAAOL,GAAc,IAAU,MAC9CC,EAAA5E,KAAA,iBAAA4E,EAAAvD,KAAA,GAAAuD,EAAAZ,GAAAY,EAAA,SAEHtW,QAAQxD,MAAK8Z,EAAAZ,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcW,EAAAZ,GAAMxV,aACrB,yBAAAoW,EAAApD,cAAA,GAAAgD,EAAA,kBA7CXpC,EAgDJ,MAAO,GAAqB,iCAAjBa,EAAGrR,KAAK/E,KAAyC,CACxD,IAAAoY,EAAyBhC,EAAGrR,KAApBzE,EAAO8X,EAAP9X,QAAY8X,EAAHvb,IAEjB4E,QAAQ4I,IAAI,4CAEZ,IAAImM,EAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAoE,IAAA,IAAA1V,EAAA2V,EAAA,OAAA5I,IAAAkB,MAAA,SAAA2H,GAAA,cAAAA,EAAA/D,KAAA+D,EAAApF,MAAA,cAAAoF,EAAA/D,KAAA,EAAA+D,EAAApF,KAAA,EAE6B6C,EAAerM,cAAcjH,kBAAkBpC,GAAQ,OAClC,OADrCqC,EAAO4V,EAAA1F,KACbpR,QAAQ4I,IAAI,+BAA+BkO,EAAApF,KAAA,EAEjC2C,EAAAA,mBAAwB0C,sBAC1BlY,EACAqC,GACH,OAJD2V,EAAaC,EAAA1F,KAOjBpR,QAAQ4I,IAAI,sDAAD4M,OAAuDR,YAAYC,MAAQF,EAAS,QAC/F/U,QAAQ4I,IAAI,8BAAD4M,OAA+BqB,EAAa,kBACvD7C,KAAKQ,YAAY,CACbjW,KAAM,sCACNsY,cAAeH,OAAOG,GAAiB,IAAU,MAClDC,EAAApF,KAAA,iBAAAoF,EAAA/D,KAAA,GAAA+D,EAAApB,GAAAoB,EAAA,SAEH9W,QAAQxD,MAAKsa,EAAApB,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcmB,EAAApB,GAAMxV,aACrB,yBAAA4W,EAAA5D,OAAA,GAAA0D,EAAA,kBAtBX9C,EAyBJ,MAAO,GAAqB,kBAAjBa,EAAGrR,KAAK/E,KAA0B,CACzC,IAAAyY,EAUIrC,EAAGrR,KATH1G,EAAUoa,EAAVpa,WACAqa,EAAaD,EAAbC,cACA/L,EAAS8L,EAAT9L,UACAgM,EAAaF,EAAbE,cACAzM,EAAYuM,EAAZvM,aACAlC,EAAGyO,EAAHzO,IACAC,EAAUwO,EAAVxO,WACAE,EAASsO,EAATtO,UACAtN,EAAG4b,EAAH5b,IAGJ4E,QAAQ4I,IAAI,yCAAD4M,OACkC0B,EAAa,QAE1D,IAAInC,EAAYC,YAAYC,MAE5BnB,EAAA7F,IAAAuE,MAAC,SAAA2E,IAAA,IAAA3Y,EAAA,OAAAyP,IAAAkB,MAAA,SAAAiI,GAAA,cAAAA,EAAArE,KAAAqE,EAAA1F,MAAA,OAKO,OALP0F,EAAArE,KAAA,EAG0B,iBAAR3X,GAAoBmZ,EAAelY,QAAQjB,GAEtDgc,EAAA1F,KAAA,EAC0B6C,EAAe7I,SACrCuL,EACA/L,EACAgM,EACA3O,EACAC,OACAQ,EACAyB,EACA/B,EACA2L,EAAAA,WAAgB1W,YAAYf,QAC5BoM,GACH,OAXKxK,EAAW4Y,EAAAhG,KAcjBpR,QAAQ4I,IAAI,oCAAD4M,OAAqChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,EAAS,QACvGf,KAAKQ,YAAY,CACbjW,KAAM,iCACN8Y,oBAAqB7Y,IACtB4Y,EAAA1F,KAAA,gBAAA0F,EAAArE,KAAA,EAAAqE,EAAA1B,GAAA0B,EAAA,SAEHpX,QAAQxD,MAAK4a,EAAA1B,IACb1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcyB,EAAA1B,GAAMxV,aACrB,QAEiC,OAFjCkX,EAAArE,KAAA,GAEHwB,EAAelY,QAAQiY,GAAa8C,EAAA9D,OAAA,6BAAA8D,EAAAlE,OAAA,GAAAiE,EAAA,uBAhC5CrD,EAmCJ,MAAO,GAAqB,gBAAjBa,EAAGrR,KAAK/E,KAAwB,CACvC,IAAA+Y,EAAiE3C,EAAGrR,KAA5DzE,EAAOyY,EAAPzY,QAASjC,EAAU0a,EAAV1a,WAAY2L,EAAG+O,EAAH/O,IAAKC,EAAU8O,EAAV9O,WAAYE,GAAS4O,EAAT5O,UAAWtN,GAAGkc,EAAHlc,IAEzD4E,QAAQ4I,IAAI,sCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAA+E,IAAA,IAAA5O,EAAA6O,EAAAhZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAAsI,GAAA,cAAAA,EAAA1E,KAAA0E,EAAA/F,MAAA,OASgC,OAThC+F,EAAA1E,KAAA,EAG0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAGhDuN,EAAgB4L,EAAejH,wBAAwBzO,GAGzD2Y,GAAgB,EAAKC,EAAA1E,KAAA,EAAA0E,EAAA/F,KAAA,EAEf6C,EAAerM,cAAcrH,WAAW8H,EAAc3G,MAAK,OACjEwV,GAAgB,EAAKC,EAAA/F,KAAA,iBAAA+F,EAAA1E,KAAA,GAAA0E,EAAA/B,GAAA+B,EAAA,SAErBzX,QAAQ4I,IAAI,yEAEV,YAGF4O,EAAe,CAAFC,EAAA/F,KAAA,yBAAA8D,OACI7M,EAAc3G,KAAI,0CAIvC,OADAhC,QAAQ4I,IAAI,WAAYL,GACxBkP,EAAA/F,KAAA,GACwB6C,EAAejM,OACnCzJ,EACA0J,EACAC,OACAQ,EACAN,GACA2L,EAAAA,WAAgB1W,YAAYf,IAC/B,QAPG4B,EAAWiZ,EAAArG,KAUfpR,QAAQ4I,IAAI,sCAAD4M,OAAuChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACzGf,KAAKQ,YAAY,CACbjW,KAAM,+BACNmZ,kBAAmBlZ,IACpBiZ,EAAA/F,KAAA,iBAAA+F,EAAA1E,KAAA,GAAA0E,EAAAE,GAAAF,EAAA,SAEHzX,QAAQ4I,IAAG6O,EAAAE,IACX3D,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAc8B,EAAAE,GAAMzX,aACrB,QAEiC,OAFjCuX,EAAA1E,KAAA,GAEHwB,EAAelY,QAAQiY,GAAamD,EAAAnE,OAAA,6BAAAmE,EAAAvE,OAAA,GAAAqE,EAAA,+BA/C5CzD,EAkDJ,MAAO,GAAqB,eAAjBa,EAAGrR,KAAK/E,KAAuB,CACtC,IAAAqZ,GAAiDjD,EAAGrR,KAA5CkH,GAAWoN,GAAXpN,YAAavL,GAAM2Y,GAAN3Y,OAAQrC,GAAUgb,GAAVhb,WAAYxB,GAAGwc,GAAHxc,IAEzC4E,QAAQ4I,IAAI,iCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAqF,IAAA,IAAArZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAA2I,GAAA,cAAAA,EAAA/E,KAAA+E,EAAApG,MAAA,OAKO,OALPoG,EAAA/E,KAAA,EAG0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAEtD0c,EAAApG,KAAA,EAC0B6C,EAAepN,MACrCqD,GACAvL,GACAoV,EAAAA,WAAgB1W,YAAYf,SAC5BoM,GACH,OALKxK,EAAWsZ,EAAA1G,KAQjBpR,QAAQ4I,IAAI,iCAAD4M,OAAkChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACpGf,KAAKQ,YAAY,CACbjW,KAAM,8BACNwZ,iBAAkBvZ,IACnBsZ,EAAApG,KAAA,gBAAAoG,EAAA/E,KAAA,EAAA+E,EAAApC,GAAAoC,EAAA,SAEH9X,QAAQ4I,IAAGkP,EAAApC,IACX1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcmC,EAAApC,GAAMxV,aACrB,QAEiC,OAFjC4X,EAAA/E,KAAA,GAEHwB,EAAelY,QAAQiY,GAAawD,EAAAxE,OAAA,6BAAAwE,EAAA5E,OAAA,GAAA2E,EAAA,uBA1B5C/D,EA6BJ,MAAO,GAAqB,cAAjBa,EAAGrR,KAAK/E,KAAsB,CACrC,IAAAyZ,GACIrD,EAAGrR,KADC4G,GAAS8N,GAAT9N,UAAWC,GAAS6N,GAAT7N,UAAW5B,GAAGyP,GAAHzP,IAAKC,GAAUwP,GAAVxP,WAAYE,GAASsP,GAATtP,UAAW9L,GAAUob,GAAVpb,WAAYxB,GAAG4c,GAAH5c,IAGtE4E,QAAQ4I,IAAI,gCAEZ,IAAImM,GAAYC,YAAYC,MAC5BnB,EAAA7F,IAAAuE,MAAC,SAAAyF,IAAA,IAAAzZ,EAAA,OAAAyP,IAAAkB,MAAA,SAAA+I,GAAA,cAAAA,EAAAnF,KAAAmF,EAAAxG,MAAA,OAMO,OANPwG,EAAAnF,KAAA,EAI0B,iBAAR3X,IAAoBmZ,EAAelY,QAAQjB,IAEtD8c,EAAAxG,KAAA,EAC0B6C,EAAetN,KACrCiD,GACAC,GACA5B,GACAC,QACAQ,EACAN,GACA2L,EAAAA,WAAgB1W,YAAYf,SAC5BoM,GACH,OATKxK,EAAW0Z,EAAA9G,KAYjBpR,QAAQ4I,IAAI,gCAAD4M,OAAiChX,EAAW,gBAAAgX,OAAeR,YAAYC,MAAQF,GAAS,QACnGf,KAAKQ,YAAY,CACbjW,KAAM,6BACN4Z,gBAAiB3Z,IAClB0Z,EAAAxG,KAAA,gBAAAwG,EAAAnF,KAAA,EAAAmF,EAAAxC,GAAAwC,EAAA,SAEHlY,QAAQ4I,IAAGsP,EAAAxC,IACX1B,KAAKQ,YAAY,CACbjW,KAAM,QACNoX,aAAcuC,EAAAxC,GAAMxV,aACrB,QAEiC,OAFjCgY,EAAAnF,KAAA,GAEHwB,EAAelY,QAAQiY,GAAa4D,EAAA5E,OAAA,6BAAA4E,EAAAhF,OAAA,GAAA+E,EAAA,uBA/B5CnE,EAkCJ,CACJ","sources":["webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/./src/workers/worker.js"],"sourcesContent":["export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","import * as aleo from \"@provablehq/sdk\";\n\nawait aleo.initThreadPool();\n\nconst defaultHost = \"https://api.explorer.aleo.org/v1\";\nconst keyProvider = new aleo.AleoKeyProvider();\nconst programManager = new aleo.ProgramManager(defaultHost, keyProvider, undefined);\nkeyProvider.useCache(true);\n\nself.postMessage({\n type: \"ALEO_WORKER_READY\",\n});\n\nlet lastLocalProgram = null;\nself.addEventListener(\"message\", (ev) => {\n if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_LOCAL\") {\n const { localProgram, aleoFunction, inputs, privateKey } = ev.data;\n\n console.log(\"Web worker: Executing function locally...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = programManager.networkClient.getProgramImports(localProgram);\n\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(localProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey});\n\n // Execute the function locally\n let response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n false,\n imports,\n keyParams,\n undefined,\n undefined,\n privateKeyObject,\n undefined\n );\n\n // Return the outputs to the main thread\n console.log(`Web worker: Local execution completed in ${performance.now() - startTime} ms`);\n const outputs = response.getOutputs();\n let execution = response.getExecution();\n if (execution) {\n aleo.verifyFunctionExecution(execution, keyProvider.getKeys(cacheKey)[1], program, \"hello\");\n execution = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n execution = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n self.postMessage({\n type: \"OFFLINE_EXECUTION_COMPLETED\",\n outputs: {outputs: outputs, execution: execution}\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_ON_CHAIN\") {\n const {\n remoteProgram,\n aleoFunction,\n inputs,\n privateKey,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\"Web worker: Creating execution...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey)\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n\n // Get the proving and verifying keys for the function\n const cacheKey = `${program_id}:${aleoFunction}`;\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(remoteProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey})\n\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n const transaction = await programManager.execute({\n programName: program_id,\n functionName: aleoFunction,\n fee: fee,\n privateFee: privateFee,\n inputs: inputs,\n keySearchParams: keyParams,\n feeRecord: feeRecord,\n privateKey: privateKeyObject\n });\n\n // Return the transaction id to the main thread\n console.log(`Web worker: On-chain execution transaction created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"EXECUTION_TRANSACTION_COMPLETED\",\n executeTransaction: transaction,\n });\n } catch (error) {\n console.error(`Error creating execution transaction: ${error}`);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_EXECUTION_FEE\") {\n const { remoteProgram, privateKey, aleoFunction, inputs, url } =\n ev.data;\n\n console.log(\"Web worker: Estimating execution fee...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.getFunctions().includes(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n const imports = await programManager.networkClient.getProgramImports(remoteProgram);\n\n // Get the proving and verifying keys for the function\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(program.toString(), aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Estimate the execution fee\n const [provingKey, verifyingKey] = programManager.keyProvider.getKeys(cacheKey);\n let executeFee = await aleo.ProgramManagerBase.estimateExecutionFee(\n privateKeyObject,\n remoteProgram,\n aleoFunction,\n inputs,\n url,\n imports,\n provingKey,\n verifyingKey,\n undefined\n );\n\n // Return the execution fee estimate to the main thread\n console.log(`Web worker: Execution fee estimated in ${performance.now() - startTime} ms`);\n console.log(`Execution Fee Estimation: ${executeFee} microcredits`);\n self.postMessage({\n type: \"EXECUTION_FEE_ESTIMATION_COMPLETED\",\n executionFee: Number(executeFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_DEPLOYMENT_FEE\") {\n const { program, url } = ev.data;\n\n console.log(\"Web worker: Estimating deployment fee...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n const imports = await programManager.networkClient.getProgramImports(program);\n console.log(\"Estimating deployment fee..\");\n let deploymentFee =\n await aleo.ProgramManagerBase.estimateDeploymentFee(\n program,\n imports,\n );\n\n // Return the deployment fee estimate to the main thread\n console.log(`Web worker: Deployment fee estimation completed in ${performance.now() - startTime} ms`);\n console.log(`Deployment Fee Estimation: ${deploymentFee} microcredits`);\n self.postMessage({\n type: \"DEPLOYMENT_FEE_ESTIMATION_COMPLETED\",\n deploymentFee: Number(deploymentFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_TRANSFER\") {\n const {\n privateKey,\n amountCredits,\n recipient,\n transfer_type,\n amountRecord,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\n `Web worker: Creating transfer of type ${transfer_type}...`,\n );\n let startTime = performance.now();\n\n (async function () {\n try {\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the transfer transaction and submit it to the network\n const transaction = await programManager.transfer(\n amountCredits,\n recipient,\n transfer_type,\n fee,\n privateFee,\n undefined,\n amountRecord,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Transfer transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"TRANSFER_TRANSACTION_COMPLETED\",\n transferTransaction: transaction,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_DEPLOY\") {\n const { program, privateKey, fee, privateFee, feeRecord, url } = ev.data;\n\n console.log(\"Web worker: Creating deployment...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Check if the program is valid\n const programObject = programManager.createProgramFromSource(program);\n\n // Check if the program already exists on the network. If so, throw an error\n let programExists = false;\n try {\n await programManager.networkClient.getProgram(programObject.id());\n programExists = true;\n } catch (e) {\n console.log(\n `Program not found on the Aleo Network - proceeding with deployment...`,\n );\n }\n\n if (programExists) {\n throw `Program ${programObject.id()} already exists on the network`;\n }\n\n console.log(\"fee is: \", fee);\n // Create the deployment transaction and submit it to the network\n let transaction = await programManager.deploy(\n program,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n )\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Deployment transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"DEPLOY_TRANSACTION_COMPLETED\",\n deployTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_SPLIT\") {\n const { splitAmount, record, privateKey, url } = ev.data;\n\n console.log(\"Web worker: Creating split...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the split transaction and submit to the network\n const transaction = await programManager.split(\n splitAmount,\n record,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Split transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"SPLIT_TRANSACTION_COMPLETED\",\n splitTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_JOIN\") {\n const { recordOne, recordTwo, fee, privateFee, feeRecord, privateKey, url } =\n ev.data;\n\n console.log(\"Web worker: Creating join...\");\n\n let startTime = performance.now();\n (async function () {\n\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the join transaction and submit it to the network\n const transaction = await programManager.join(\n recordOne,\n recordTwo,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Join transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"JOIN_TRANSACTION_COMPLETED\",\n joinTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n }\n});\n"],"names":["async","get","url","options","response","fetch","ok","Error","status","post","method","AleoNetworkClient","host","headers","account","constructor","this","setAccount","getAccount","setHost","fetchData","json","error","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","RecordCiphertext","fromString","value","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","console","warn","toString","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","message","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","undefined","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","_regeneratorRuntime","t","r","prototype","n","o","defineProperty","Symbol","a","iterator","c","asyncIterator","u","toStringTag","define","enumerable","configurable","writable","wrap","Generator","create","Context","makeInvokeMethod","tryCatch","arg","call","h","f","s","y","GeneratorFunction","GeneratorFunctionPrototype","p","d","getPrototypeOf","v","values","g","defineIteratorMethods","forEach","_invoke","AsyncIterator","invoke","_typeof","resolve","__await","then","callInvokeWithMethodAndArg","done","delegate","maybeInvokeDelegate","sent","_sent","dispatchException","abrupt","TypeError","resultName","next","nextLoc","pushTryEntry","tryLoc","catchLoc","finallyLoc","afterLoc","tryEntries","resetTryEntry","completion","reset","isNaN","displayName","isGeneratorFunction","mark","setPrototypeOf","__proto__","awrap","Promise","reverse","pop","prev","charAt","slice","stop","rval","handle","complete","finish","delegateYield","asyncGeneratorStep","gen","reject","_next","_throw","info","_asyncToGenerator","fn","self","args","arguments","apply","err","aleo","defaultHost","programManager","postMessage","lastLocalProgram","addEventListener","ev","_ev$data","localProgram","aleoFunction","startTime","performance","now","_callee","privateKeyObject","program_id","keyParams","_context","hasFunction","concat","getOutputs","t0","errorMessage","_ev$data2","remoteProgram","_callee2","_context2","executeTransaction","_ev$data3","_callee3","_programManager$keyPr","_programManager$keyPr2","executeFee","_context3","getFunctions","estimateExecutionFee","executionFee","Number","_ev$data4","_callee4","deploymentFee","_context4","estimateDeploymentFee","_ev$data5","amountCredits","transfer_type","_callee5","_context5","transferTransaction","_ev$data6","_callee6","programExists","_context6","deployTransaction","t1","_ev$data7","_callee7","_context7","splitTransaction","_ev$data8","_callee8","_context8","joinTransaction"],"sourceRoot":""} \ No newline at end of file diff --git a/38c18e22c4f37629c446.wasm b/38c18e22c4f37629c446.wasm deleted file mode 100644 index 7d6ef6365..000000000 Binary files a/38c18e22c4f37629c446.wasm and /dev/null differ diff --git a/444.bundle.js b/444.bundle.js new file mode 100644 index 000000000..1cb94e6ba --- /dev/null +++ b/444.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={444:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=444.bundle.js.map \ No newline at end of file diff --git a/444.bundle.js.map b/444.bundle.js.map new file mode 100644 index 000000000..caad75089 --- /dev/null +++ b/444.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"444.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t444: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/495.bundle.js b/495.bundle.js new file mode 100644 index 000000000..cca9c4d14 --- /dev/null +++ b/495.bundle.js @@ -0,0 +1,2 @@ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[495],{495:(e,r,t)=>{t.a(e,(async(e,i)=>{try{t.d(r,{AleoKeyProvider:()=>u,AleoKeyProviderParams:()=>h,PrivateKey:()=>n.ZD,ProgramManager:()=>f,ProgramManagerBase:()=>n.Ao,initThreadPool:()=>n.Fs,verifyFunctionExecution:()=>n.Yc});var n=t(877),a=e([n]);n=(a.then?(await a)():a)[0];async function o(e,r){const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not get URL "+e);return t}async function s(e,r){r.method="POST";const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not post URL "+e);return t}class c{host;headers;account;constructor(e,r){this.host=e+"/testnet",r&&r.headers?this.headers=r.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const r=await o(this.host+e,{headers:this.headers});return await r.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,r,t,i,a,o){if(o=o||[],e<0)throw new Error("Start height must be greater than or equal to 0");const s=new Array;let c,h,u,f,d=0,l=BigInt(0);if(void 0===t){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");u=this.account._privateKey}else try{u=t instanceof n.ZD?t:n.ZD.from_string(t)}catch(e){throw new Error("Error parsing private key provided.")}const y=u.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");f=e}catch(e){throw new Error("Error fetching latest block height.")}if(h="number"==typeof r&&r<=f?r:f,e>h)throw new Error("Start height must be less than or equal to end height.");for(;h>e;){c=h-50,c=BigInt(a))))return s;if(void 0!==i&&i.length>0){let e=0;if(r.microcredits()>i[e]){if(e+=1,s.push(r),"number"==typeof a&&(l+=r.microcredits(),l>=BigInt(a)))return s;if(s.length>=i.length)return s}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+c.toString()+"-"+h.toString()),console.warn("Error: ",e),d+=1,d>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),s}}return s}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,r){try{return await this.fetchData("/blocks?start="+e+"&end="+r)}catch(t){throw new Error("Error fetching blocks between "+e+" and "+r+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof n.BP&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const r=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(r)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return n.BP.fromString(e)}catch(r){try{return n.BP.fromString(await this.getProgram(e))}catch(r){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const r={},t=(e instanceof n.BP?e:await this.getProgramObject(e)).getImports();for(let e=0;e0&&!p)try{p=await this.networkClient.getProgramImports(r)}catch(e){throw K(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await n.Ao.buildExecutionTransaction(v,y,t,o,i,f,this.host,p,d,l,w,b,u)}async execute(e){const r=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(r)}async run(e,r,t,i,a,o,s,c,h,u){let f=h;if(void 0===h&&void 0!==this.account&&(f=this.account.privateKey()),void 0===f)throw"No private key provided and no private key set in the ProgramManager";if(!s||!c)try{[s,c]=await this.keyProvider.functionKeys(o)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",s),console.log("Verifying key: ",c),n.Ao.executeFunctionOffline(f,e,r,t,i,!1,a,s,c,this.host,u)}async join(e,r,t,i,a,o,s,c){let h,u,f=s;if(void 0===s&&void 0!==this.account&&(f=this.account.privateKey()),void 0===f)throw"No private key provided and no private key set in the ProgramManager";try{h=i?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),u=await this.keyProvider.joinKeys()}catch(e){throw K(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[d,l]=h,[y,p]=u;try{o=i?await this.getCreditsRecord(t,[],o,a):void 0}catch(e){throw K(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof n.ZF?e:n.ZF.fromString(e),r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw K("Records provided are not valid. Please ensure they are valid plaintext records.")}const g=await n.Ao.buildJoinTransaction(f,e,r,t,o,this.host,y,p,d,l,c);return await this.networkClient.submitTransaction(g)}async split(e,r,t,i){let a,o=t;if(void 0===o&&void 0!==this.account&&(o=this.account.privateKey()),void 0===o)throw"No private key provided and no private key set in the ProgramManager";try{a=await this.keyProvider.splitKeys()}catch(e){throw K(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[s,c]=a;try{r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw K("Record provided is not valid. Please ensure it is a valid plaintext record.")}const h=await n.Ao.buildSplitTransaction(o,e,r,this.host,s,c,i);return await this.networkClient.submitTransaction(h)}async synthesizeKeys(e,r,t,i){let a,o=i;void 0===o&&(o=void 0!==this.account?this.account.privateKey():new n.ZD);try{a=await this.networkClient.getProgramImports(e);const i=await n.Ao.synthesizeKeyPair(o,e,r,t,a);return[i.provingKey(),i.verifyingKey()]}catch(e){throw K(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,r,t,i,a,o,s,c,h,u){t=l(t);let f,y,p=h;if(void 0===p&&void 0!==this.account&&(p=this.account.privateKey()),void 0===p)throw"No private key provided and no private key set in the ProgramManager";try{f=a?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),y=await this.keyProvider.transferKeys(t)}catch(e){throw K(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[g,v]=f,[w,b]=y;try{const e=[];d(t)?(s=await this.getCreditsRecord(i,[],s,o),e.push(s.nonce())):s=void 0,c=a?await this.getCreditsRecord(i,e,c,o):void 0}catch(e){throw K(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await n.Ao.buildTransferTransaction(p,e,r,t,s,i,c,this.host,w,b,g,v,u)}async buildTransferPublicTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async buildTransferPublicAsSignerTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async transfer(e,r,t,i,n,a,o,s,c,h){const u=await this.buildTransferTransaction(e,r,t,i,n,a,o,s,c,h);return await this.networkClient.submitTransaction(u)}async buildBondPublicTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*i),{programName:o="credits.aleo",functionName:s="bond_public",fee:c=n.fee||.86,privateFee:u=!1,inputs:f=[e,r,t,`${a.toString()}u64`],keySearchParams:d=new h({proverUri:g.bond_public.prover,verifierUri:g.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:l=this.creditsProgram(),...y}=n,p={programName:o,functionName:s,fee:c,privateFee:u,inputs:f,keySearchParams:d,...y};return await this.buildExecutionTransaction(p)}async bondPublic(e,r,t,i,n={}){const a=await this.buildBondPublicTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildBondValidatorTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*t),o=Math.trunc(i),{programName:s="credits.aleo",functionName:c="bond_validator",fee:u=n.fee||.86,privateFee:f=!1,inputs:d=[e,r,`${a.toString()}u64`,`${o.toString()}u8`],keySearchParams:l=new h({proverUri:g.bond_validator.prover,verifierUri:g.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:y=this.creditsProgram(),...p}=n,v={programName:s,functionName:c,fee:u,privateFee:f,inputs:d,keySearchParams:l,...p};return await this.buildExecutionTransaction(v)}async bondValidator(e,r,t,i,n={}){const a=await this.buildBondValidatorTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildUnbondPublicTransaction(e,r,t={}){const i=Math.trunc(1e6*r),{programName:n="credits.aleo",functionName:a="unbond_public",fee:o=t.fee||1.3,privateFee:s=!1,inputs:c=[e,`${i.toString()}u64`],keySearchParams:u=new h({proverUri:g.unbond_public.prover,verifierUri:g.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:f=this.creditsProgram(),...d}=t,l={programName:n,functionName:a,fee:o,privateFee:s,inputs:c,keySearchParams:u,...d};return this.buildExecutionTransaction(l)}async unbondPublic(e,r,t={}){const i=await this.buildUnbondPublicTransaction(e,r,t);return await this.networkClient.submitTransaction(i)}async buildClaimUnbondPublicTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="claim_unbond_public",fee:n=r.fee||2,privateFee:a=!1,inputs:o=[e],keySearchParams:s=new h({proverUri:g.claim_unbond_public.prover,verifierUri:g.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:c=this.creditsProgram(),...u}=r,f={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...u};return await this.buildExecutionTransaction(f)}async claimUnbondPublic(e,r={}){const t=await this.buildClaimUnbondPublicTransaction(e,r);return await this.networkClient.submitTransaction(t)}async buildSetValidatorStateTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="set_validator_state",fee:n=1,privateFee:a=!1,inputs:o=[e.toString()],keySearchParams:s=new h({proverUri:g.set_validator_state.prover,verifierUri:g.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...c}=r,u={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...c};return await this.execute(u)}async setValidatorState(e,r={}){const t=await this.buildSetValidatorStateTransaction(e,r);return this.networkClient.submitTransaction(t)}verifyExecution(e){try{const r=e.getExecution(),t=e.getFunctionId(),i=e.getProgram(),a=e.getVerifyingKey();return(0,n.Yc)(r,a,i,t)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return n.BP.fromString(e)}creditsProgram(){return n.BP.getCreditsProgram()}verifyProgram(e){try{return n.BP.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,r,t,i){try{return t instanceof n.ZF?t:n.ZF.fromString(t)}catch(t){try{const t=this.recordProvider;return await t.findCreditsRecord(e,!0,r,i)}catch(e){throw K(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function d(e){return v.has(e)}function l(e){return w.has(e)?e:K(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const y=n.OS.baseUrl();function p(e){const r=n.pF[e.verifyingKey];if(!r)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:r}}const g={bond_public:p(n.OS.bond_public()),bond_validator:p(n.OS.bond_validator()),claim_unbond_public:p(n.OS.claim_unbond_public()),fee_private:p(n.OS.fee_private()),fee_public:p(n.OS.fee_public()),inclusion:p(n.OS.inclusion()),join:p(n.OS.join()),set_validator_state:p(n.OS.set_validator_state()),split:p(n.OS.split()),transfer_private:p(n.OS.transfer_private()),transfer_private_to_public:p(n.OS.transfer_private_to_public()),transfer_public:p(n.OS.transfer_public()),transfer_public_as_signer:p(n.OS.transfer_public_as_signer()),transfer_public_to_private:p(n.OS.transfer_public_to_private()),unbond_public:p(n.OS.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},v=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),w=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),b=new Set(["private","transfer_private","transferPrivate"]),m=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),_=new Set(["public","transfer_public","transferPublic"]),P=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),k=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function K(e){throw console.error(e),e}i()}catch(E){i(E)}}))}}]); +//# sourceMappingURL=495.bundle.js.map \ No newline at end of file diff --git a/495.bundle.js.map b/495.bundle.js.map new file mode 100644 index 000000000..0b207f63e --- /dev/null +++ b/495.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"495.bundle.js","mappings":"gWAAOA,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,sBAAwBN,GAG9D,OAAOE,CACX,CAGOJ,eAAeS,EAAKP,EAAmBC,GAC1CA,EAAQO,OAAS,OAEjB,MAAMN,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,uBAAyBN,GAG/D,OAAOE,CACX,CCUA,MAAMO,EACJC,KACAC,QACAC,QAEAC,WAAAA,CAAYH,EAAcT,GACxBa,KAAKJ,KAAOA,EAAO,WAEfT,GAAWA,EAAQU,QACrBG,KAAKH,QAAUV,EAAQU,QAGvBG,KAAKH,QAAU,CAEb,qBAAsB,S,CAa5BI,UAAAA,CAAWH,GACTE,KAAKF,QAAUA,C,CASjBI,UAAAA,GACE,OAAOF,KAAKF,O,CASdK,OAAAA,CAAQP,GACNI,KAAKJ,KAAOA,EAAO,U,CAGrB,eAAMQ,CACFlB,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIe,KAAKJ,KAAOV,EAAK,CAC1CW,QAASG,KAAKH,UAGhB,aAAaT,EAASiB,MACrB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,uBACjB,C,CA0BH,wBAAMgB,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIjB,MAAM,mDAIlB,MAAMuB,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfZ,EAA4B,CACrC,QAA4B,IAAjBV,KAAKF,QACd,MAAM,IAAIP,MAAM,oGAEhB2B,EAAqBlB,KAAKF,QAAQyB,WAErC,MACC,IACEL,EAAqBR,aAAsBc,EAAAA,GAAad,EAAac,EAAAA,GAAWC,YAAYf,EAC7F,CAAC,MAAOJ,GACP,MAAM,IAAIf,MAAM,sCACjB,CAEH,MAAMmC,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoB5B,KAAK6B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIrC,MAAM,uCAFhB4B,EAAeS,CAIlB,CAAC,MAAOtB,GACP,MAAM,IAAIf,MAAM,sCACjB,CAUD,GANE0B,EADuB,iBAAdR,GAA0BA,GAAaU,EAC1CV,EAEAU,EAIJX,EAAcS,EAChB,MAAM,IAAI1B,MAAM,0DAIlB,KAAO0B,EAAMT,GAAa,CACxBQ,EAAQC,EAAM,GACVD,EAAQR,IACVQ,EAAQR,GAEV,IAEE,MAAMsB,QAAe9B,KAAK+B,cAAcf,EAAOC,GAE/C,GADAA,EAAMD,IACAc,aAAkBvC,OAEtB,IAAK,IAAIyC,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAASC,EAAAA,GAAiBC,WAAWH,EAAOI,OAElD,GAAIH,EAAOI,QAAQzB,GAAU,CAE3B,MAAM0B,EAAkBL,EAAOM,QAAQ3B,GAGjC4B,EAAQF,EAAgBE,QAC9B,GAAIzC,EAAO0C,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBvC,EAAoB,eAAgB,WAE5F,UACQlB,KAAK0D,gBAAgBF,EAC5B,CAAC,MAAOlD,GAEP,IAAKK,IACHG,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQsB,OAAS,EAAG,CAC3D,IAAI4B,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiBjD,EAAQkD,GAAgB,CAIzD,GAHAA,GAAiB,EACjB/C,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQmB,QAAUtB,EAAQsB,OAC5B,OAAOnB,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAOR,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHAwD,QAAQC,KAAK,mCAAqC/C,EAAMgD,WAAa,IAAM/C,EAAI+C,YAC/EF,QAAQC,KAAK,UAAWzD,GACxBc,GAAY,EACRA,EAAW,GAEb,OADA0C,QAAQC,KAAK,0EACNjD,CAEV,CACF,CACD,OAAOA,C,CAUT,cAAMmD,CAASC,GACb,IAEE,aADoBlE,KAAKI,UAAiB,UAAY8D,EAEvD,CAAC,MAAO5D,GACP,MAAM,IAAIf,MAAM,wBACjB,C,CAWH,mBAAMwC,CAAcf,EAAeC,GACjC,IACE,aAAajB,KAAKI,UAAwB,iBAAmBY,EAAQ,QAAUC,EAChF,CAAC,MAAOX,GAEP,MAAM,IAAIf,MADW,iCAAmCyB,EAAQ,QAAUC,EAAM,IAEjF,C,CASH,0CAAMkD,CAAqCxB,GACrCA,aAAmByB,EAAAA,KACrBzB,EAAUA,EAAQqB,YAEpB,IAEE,aADiBhE,KAAKI,UAAkB,kCAAoCuC,IAClE0B,QAAQ,IAAM,GACzB,CAAC,MAAO/D,GACP,MAAM,IAAIf,MAAM,qDACjB,C,CASH,wCAAM+E,CAAmC3B,GACvC,IACE,MAAM4B,QAA+BvE,KAAKmE,qCAAqCxB,GAC/E,aAA+B3C,KAAKwE,eAAeD,EACpD,CAAC,MAAOjE,GACP,MAAM,IAAIf,MAAM,qDACjB,C,CASH,oBAAMkF,GACJ,IACE,aAAazE,KAAKI,UAAiB,gBACpC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,C,CAQH,wBAAMmF,GACJ,IACE,aAAa1E,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,C,CASH,qBAAMsC,GACJ,IACE,aAAa7B,KAAKI,UAAkB,iBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,gCACjB,C,CAcH,gBAAMoF,CAAWC,GACf,IACE,aAAa5E,KAAKI,UAAkB,YAAcwE,EACnD,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,yBACjB,C,CAoBH,sBAAMsF,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnB,WAAW6B,EAC3B,CAAC,MAAOxE,GACP,IACE,OAAO8D,EAAAA,GAAQnB,iBAA0BjD,KAAK2E,WAAWG,GAC1D,CAAC,MAAOxE,GACP,MAAM,IAAIf,MAAM,GAAGuF,iDACpB,CACF,C,CA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIlD,EAAI,EAAGA,EAAIiD,EAAWhD,OAAQD,IAAK,CAC1C,MAAMmD,EAAYF,EAAWjD,GAC7B,IAAKgD,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8BrF,KAAK2E,WAAWQ,GAC9CG,QAAsCtF,KAAK+E,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAO1E,GACP,MAAMkF,EAAY,mCAAqClF,EACxD,C,CAcH,2BAAMmF,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IACxFI,YAChB,CAAC,MAAO5E,GACP,MAAM,IAAIf,MAAM,8CAAgDe,EACjE,C,CAYH,4BAAMoF,CAAuBd,GAC3B,IACE,aAAa5E,KAAKI,UAAyB,YAAcwE,EAAY,YACtE,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,2FACjB,C,CAiBH,4BAAMoG,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAavF,KAAKI,UAAkB,YAAcwE,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAOjF,GACP,MAAM,IAAIf,MAAM,kFACjB,C,CASH,kBAAMsG,GACJ,IACE,aAAa7F,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCACjB,C,CAUH,oBAAMiF,CAAesB,GACnB,IACA,aAAa9F,KAAKI,UAA4B,gBAAkB0F,EAC/D,CAAC,MAAOxF,GACP,MAAM,IAAIf,MAAM,8BACjB,C,CAUH,qBAAMwG,CAAgB7B,GACpB,IACA,aAAalE,KAAKI,UAAmC,UAAY8D,EAAOF,WAAa,gBACpF,CAAC,MAAO1D,GACP,MAAM,IAAIf,MAAM,+BACjB,C,CASH,8BAAMyG,GACJ,IACE,aAAahG,KAAKI,UAAmC,2BACtD,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,4CACjB,C,CAUH,qBAAMmE,CAAgBuC,GACpB,IACE,aAAajG,KAAKI,UAAkB,sBAAwB6F,EAC7D,CAAC,MAAO3F,GACP,MAAM,IAAIf,MAAM,gCACjB,C,CASH,uBAAM2G,CAAkB5D,GACtB,MAAM6D,EAAqB7D,aAAuB8D,EAAAA,GAAc9D,EAAY0B,WAAa1B,EACzF,IACE,MAAMlD,QAAiBK,EAAKO,KAAKJ,KAAO,yBAA0B,CAChEyG,KAAMF,EACNtG,QAASyG,OAAOC,OAAO,CAAC,EAAGvG,KAAKH,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaT,EAASiB,MAEvB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,qDAAsDe,EAAgBkG,UACvF,CACF,CAAC,MAAOlG,GACP,MAAM,IAAIf,MAAM,oDAAqDe,EAAgBkG,UACtF,C,ECjnBL,MAAMC,EACFC,KACAC,UACAC,YACAC,SAUA9G,WAAAA,CAAY+G,GACR9G,KAAK2G,UAAYG,EAAOH,UACxB3G,KAAK4G,YAAcE,EAAOF,YAC1B5G,KAAK6G,SAAWC,EAAOD,SACvB7G,KAAK0G,KAAOI,EAAOJ,I,EAyK3B,MAAMK,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFjI,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBkI,QAAahI,EAASiI,cAC5B,OAAO,IAAIC,WAAWF,EACrB,CAAC,MAAO9G,GACL,MAAM,IAAIf,MAAM,uBAAyBe,EAC5C,C,CAGLP,WAAAA,GACIC,KAAKkH,QAAUK,EACfvH,KAAKgH,MAAQ,IAAIQ,IACjBxH,KAAKiH,aAAc,C,CAQvBQ,QAAAA,CAASA,GACLzH,KAAKiH,YAAcQ,C,CAMvBC,UAAAA,GACI1H,KAAKgH,MAAMW,O,CAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC9H,KAAKgH,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,W,CAS9DC,YAAAA,CAAaN,GACT,OAAO7H,KAAKgH,MAAMoB,IAAIP,E,CAS1BQ,UAAAA,CAAWR,GACP,OAAO7H,KAAKgH,MAAMsB,OAAOT,E,CAS7BU,OAAAA,CAAQV,GAEJ,GADA/D,QAAQ0E,MAAM,2CAA2CX,KACrD7H,KAAKgH,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC1I,KAAKgH,MAAM/H,IAAI4I,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAInJ,MAAM,0B,CAwBzB,kBAAMuJ,CAAahC,GACf,GAAIA,EAAQ,CACR,IAAIiC,EACAC,EACAnC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIvB,EAAM0D,EAAqBC,OAAOpC,EAAa,MACnD,KAAMvB,aAAehG,OACjB,OAAOS,KAAKmJ,iBAAiB5D,EAEpC,CAcD,GAZI,cAAeuB,GAAwC,iBAAvBA,EAAkB,YAClDiC,EAAYjC,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDkC,EAAclC,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5BiC,GAAaC,EACb,aAAahJ,KAAKoJ,gBAAgBL,EAAWC,EAAanC,GAG9D,GAAIA,EACA,OAAO7G,KAAKuI,QAAQ1B,EAE3B,CACD,MAAMtH,MAAM,mG,CA4BhB,qBAAM6J,CAAgBL,EAAmBC,EAAqBnC,GAC1D,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,MAAO,CAACyF,EAAAA,GAAWC,UAAU1F,EAAM,IAAK2F,EAAAA,GAAaD,UAAU1F,EAAM,KAClE,CACHY,QAAQ0E,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAC1EjF,QAAQ0E,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoChI,KAAKqJ,gBAAgBL,GAE/D,OADAhJ,KAAKgH,MAAMiB,IAAIpB,EAAU,CAACkB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAE1E,MAAO,CAAChB,QADkC/H,KAAKqJ,gBAAgBL,GAElE,CACJ,CAAC,MAAO1I,GACL,MAAM,IAAIf,MAAM,UAAUe,kDAAsDyI,SAAiBC,KACpG,C,CAWL,qBAAMM,CAAgBP,EAAmBlC,GACrC,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,OAAOyF,EAAAA,GAAWC,UAAU1F,EAAM,IAElCY,QAAQ0E,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAAC,MAAOzI,GACL,MAAM,IAAIf,MAAM,UAAUe,oCAAwCyI,IACrE,C,CAGL,sBAAMI,CAAiB5D,GACnB,IACI,GAAKvF,KAAKgH,MAAMoB,IAAI7C,EAAIgE,UAAavJ,KAAKiH,YAOnC,CACH,MAAMuC,EAAyBxJ,KAAKgH,MAAM/H,IAAIsG,EAAIgE,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgBlE,EAAIyC,eACpB0B,QAAgC1J,KAAKsJ,gBAAgB/D,EAAIoE,OAAQpE,EAAIgE,SAI3E,OAHIvJ,KAAKiH,aACLjH,KAAKgH,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAOnJ,GACL,MAAM,IAAIf,MAAM,sCAAsCe,IACzD,C,CAGL,oBAAMuJ,GACF,OAAO7J,KAAKmJ,iBAAiBF,EAAqBW,Y,CAGtDE,iBAAAA,GACI,OAAO9J,KAAKmJ,iBAAiBF,EAAqBc,e,CAGtDC,qBAAAA,GACI,OAAOhK,KAAKmJ,iBAAiBF,EAAqBgB,oB,CAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanK,KAAKmJ,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanK,KAAKmJ,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanK,KAAKmJ,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAItL,MAAM,0B,CASxB,cAAMuL,GACF,aAAa9K,KAAKmJ,iBAAiBF,EAAqB8B,K,CAQ5D,eAAMC,GACF,aAAahL,KAAKmJ,iBAAiBF,EAAqBgC,M,CAQ5D,oBAAMC,GACF,aAAalL,KAAKmJ,iBAAiBF,EAAqBkC,Y,CAQ5D,mBAAMC,GACF,aAAapL,KAAKmJ,iBAAiBF,EAAqBoC,W,CAS5D,qBAAMhC,CAAgBzC,GAClB,OAAQA,GACJ,KAAKqC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM5I,QAAiBH,EAAI2H,GACrB8E,QAAatM,EAASsM,OAC5B,OAAqB7C,EAAAA,GAAa5F,WAAWyI,EAChD,CAAC,MAAOC,GAEL,IACA,OAAqB9C,EAAAA,GAAaD,gBAAgB5I,KAAKmH,WAAWP,GACjE,CAAC,MAAOgF,GACL,OAAO,IAAIrM,MAAM,iCAAmCqM,EACvD,CACJ,E,CAIbC,gBAAAA,GACI,OAAO7L,KAAKmJ,iBAAiBF,EAAqBwC,c,EC/hB1D,MAAMK,EACFhM,QACAiM,YACAnM,KACAoM,cACAC,eAQAlM,WAAAA,CAAYH,EAA2BmM,EAA+CE,GAClFjM,KAAKJ,KAAOA,GAAc,mCAC1BI,KAAKgM,cAAgB,IAAIrM,EAAkBK,KAAKJ,MAEhDI,KAAK+L,YAAcA,GAA4B,IAAIhF,EACnD/G,KAAKiM,eAAiBA,C,CAQ1BhM,UAAAA,CAAWH,GACPE,KAAKF,QAAUA,C,CAQnBoM,cAAAA,CAAeH,GACX/L,KAAK+L,YAAcA,C,CAQvB5L,OAAAA,CAAQP,GACJI,KAAKJ,KAAOA,EACZI,KAAKgM,cAAc7L,QAAQP,E,CAQ/BuM,iBAAAA,CAAkBF,GACdjM,KAAKiM,eAAiBA,C,CAkC1B,YAAMG,CACFzJ,EACA0J,EACAC,EACAC,EACAC,EACA9L,GAGA,IACI,MAAM+L,EAAgBrI,EAAAA,GAAQnB,WAAWN,GACzC,IAAI0C,EACJ,IACIA,QAAsBrF,KAAKgM,cAAcrH,WAAW8H,EAAc3G,KACrE,CAAC,MAAO6F,GAEL7H,QAAQ4I,IAAI,WAAWD,EAAc3G,mDACxC,CACD,GAA4B,iBAAjBT,EACP,KAAO,WAAWoH,EAAc3G,gEAEvC,CAAC,MAAO6F,GACL,MAAMnG,EAAY,6BAA6BmG,IAClD,CAGD,IAiBIgB,EAjBAC,EAAuBlM,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD8M,EAAuB5M,KAAKF,QAAQY,mBAGJ,IAAzBkM,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAI3H,EACJ,IACIA,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,EACxD,CAAC,MAAOgJ,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAGD,MAAMsB,QAAWC,EAAAA,GAAmBC,2BAA2BP,EAAsBjK,EAAS0J,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+H,EAAeC,GACjJ,aAAahN,KAAKgM,cAAc9F,kBAAkB+G,E,CA8BtD,+BAAMG,CAA0BjO,GAE5B,MAAM,YACFkO,EAAW,aACXC,EAAY,IACZjB,EAAG,WACHC,EAAU,OACViB,EAAM,mBACNhB,EAAkB,gBAClBiB,EAAe,WACf9M,EAAU,aACV+M,GACAtO,EAEJ,IAAIqN,EAAYrN,EAAQqN,UACpBzE,EAAa5I,EAAQ4I,WACrBC,EAAe7I,EAAQ6I,aACvBrF,EAAUxD,EAAQwD,QAClBqC,EAAU7F,EAAQ6F,QAGtB,QAAgB8H,IAAZnK,EACA,IACIA,QAAyB3C,KAAKgM,cAAcrH,WAAW0I,EAC1D,CAAC,MAAO1B,GACL,MAAMnG,EAAY,iBAAiB6H,yBAAmC1B,qGACzE,MACMhJ,aAAmByB,EAAAA,KAC1BzB,EAAUA,EAAQqB,YAItB,IAiBI2I,EAjBAe,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IACIlB,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAK5E,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAKL,GADwBvH,EAAAA,GAAQnB,WAAWN,GAASuC,aAAajD,OAC3C,IAAM+C,EACxB,IACIA,QAAgChF,KAAKgM,cAAcjH,kBAAkBsI,EACxE,CAAC,MAAO1B,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAIL,aAAauB,EAAAA,GAAmBE,0BAA0BM,EAAqB/K,EAAS2K,EAAcC,EAAQlB,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+C,EAAYC,EAAc+E,EAAeC,EAAiBS,E,CA8BhN,aAAME,CAAQxO,GACV,MAAM8N,QAAwBjN,KAAKoN,0BAA0BjO,GAC7D,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,E,CAoCtD,SAAMW,CACFjL,EACAkL,EACAN,EACAO,EACA9I,EACAwI,EACAzF,EACAC,EACAtH,EACA+M,GAGA,IAAIC,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IAAK3F,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAOL,OAHA7H,QAAQ4I,IAAI,2BACZ5I,QAAQ4I,IAAI,gBAAiB3E,GAC7BjE,QAAQ4I,IAAI,kBAAmB1E,GACxBkF,EAAAA,GAAmBa,uBAAuBL,EAAqB/K,EAASkL,EAAeN,EAAQO,GAAgB,EAAO9I,EAAS+C,EAAYC,EAAchI,KAAKJ,KAAM6N,E,CAiB/K,UAAM1C,CACFiD,EACAC,EACA5B,EACAC,EACAC,EACAC,EACA9L,EACA+M,GAGA,IAUId,EACA7B,EAXA4C,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HN,QAAkC9K,KAAK+L,YAAYjB,UACtD,CAAC,MAAOa,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCuB,EAAgBC,GAAoBrD,EAG3C,IACI0B,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,IACIqC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBnL,WAAW+K,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBnL,WAAWgL,EAC7F,CAAC,MAAOtC,GACL,MAAMnG,EAAY,kFACrB,CAGD,MAAMyH,QAAWC,EAAAA,GAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW5B,EAAKG,EAAWxM,KAAKJ,KAAMsO,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,E,CAyBtD,WAAMhC,CAAMqD,EAAqBC,EAAwC7N,EAAyB+M,GAE9F,IAUIzC,EAVA0C,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAKV,IACI1C,QAAmChL,KAAK+L,YAAYf,WACvD,CAAC,MAAOW,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAO6C,EAAiBC,GAAqBzD,EAG7C,IACIuD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBnL,WAAWsL,EACtG,CAAC,MAAO5C,GACL,MAAMnG,EAAY,8EACrB,CAGD,MAAMyH,QAAWC,EAAAA,GAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcvO,KAAKJ,KAAM4O,EAAiBC,EAAmBhB,GACzJ,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,E,CAatD,oBAAM0B,CACFhM,EACAiM,EACArB,EACA7M,GAGA,IAAIsE,EAEA0I,EAAsBhN,OACS,IAAxBgN,IAEHA,OADwB,IAAjB1N,KAAKF,QACUE,KAAKF,QAAQY,aAEb,IAAIc,EAAAA,IAKlC,IACIwD,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACrD,MAAM6G,QAAgB0D,EAAAA,GAAmB2B,kBACrCnB,EACA/K,EACAiM,EACArB,EACAvI,GAEJ,MAAO,CAAawE,EAAQzB,aAA4ByB,EAAQxB,eACnE,CAAC,MAAO2D,GACL,MAAMnG,EAAY,qCAAqCmG,oEAC1D,C,CAgCL,8BAAMmD,CACFC,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUItC,EACAzC,EAXAwD,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HlB,QAAsClK,KAAK+L,YAAY7B,aAAa+E,EACvE,CAAC,MAAOtD,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCwC,EAAoBC,GAAwBlF,EAGnD,IAEI,MAAMrJ,EAAmB,GACrBwO,EAAqBJ,IAErBV,QAAsCvO,KAAK6M,iBAAiBR,EAAK,GAAIkC,EAAchC,GACnF1L,EAAO8C,KAAK4K,EAAajL,UAEzBiL,OAAezB,EAEnBN,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAKxL,EAAQ2L,EAAWD,QAAsBO,CACvH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,aAAauB,EAAAA,GAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAclC,EAAKG,EAAWxM,KAAKJ,KAAMuP,EAAoBC,EAAsBrC,EAAeC,EAAiBS,E,CAmBtO,oCAAM6B,CACFP,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,E,CAmB/H,4CAAM8B,CACFR,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,E,CA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAEA,MAAMR,QAAwBjN,KAAK8O,yBAAyBC,EAAQC,EAAWC,EAAc5C,EAAKC,EAAYC,EAAoBgC,EAAc/B,EAAW9L,EAAY+M,GACvK,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,E,CAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB5P,EAAmC,CAAC,GAChK,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAoB,GAAGC,EAAa7L,iBAAgB,gBACjGwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBW,YAAYD,OAC5C/C,YAAaqC,EAAqBW,YAAY0B,SAC9CzE,SAAU,6BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,E,CA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB5P,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKyP,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ5P,GAC7H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,E,CAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/J,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa7L,gBAAiB,GAAGsM,EAAmBtM,gBAAe,gBACvHwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBc,eAAeJ,OAC/C/C,YAAaqC,EAAqBc,eAAeuB,SACjDzE,SAAU,gCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,E,CA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKoQ,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYlR,GAC5H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,E,CAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3G,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BjB,EAAMlN,EAAQkN,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgB,GAAGG,EAAa7L,iBAAgB,gBAC1DwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBwC,cAAc9B,OAC9C/C,YAAaqC,EAAqBwC,cAAcH,SAChDzE,SAAU,+BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,OAAOjQ,KAAKoN,0BAA0B8C,E,CA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3F,MAAM8N,QAAwBjN,KAAKwQ,6BAA6Bd,EAAgBX,EAAQ5P,GACxF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,E,CAyBtD,uCAAMyD,CAAkChB,EAAwBvQ,EAAmC,CAAC,GAChG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAMlN,EAAQkN,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBgB,oBAAoBN,OACpD/C,YAAaqC,EAAqBgB,oBAAoBqB,SACtDzE,SAAU,qCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,E,CAuBhD,uBAAMS,CAAkBjB,EAAwBvQ,EAAmC,CAAC,GAChF,MAAM8N,QAAwBjN,KAAK0Q,kCAAkChB,EAAgBvQ,GACrF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,E,CAiCtD,uCAAM2D,CAAkCC,EAA0B1R,EAAmC,CAAC,GAClG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBiB,EAAS,CAACsD,EAAgB7M,YAAW,gBACrCwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBuC,oBAAoB7B,OACpD/C,YAAaqC,EAAqBuC,oBAAoBF,SACtDzE,SAAU,wCAEXoJ,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAK2N,QAAQuC,E,CA8B9B,uBAAMY,CAAkBD,EAA0B1R,EAAmC,CAAC,GAClF,MAAM8N,QAAmBjN,KAAK4Q,kCAAkCC,EAAiB1R,GACjF,OAAOa,KAAKgM,cAAc9F,kBAAkB+G,E,CAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMzO,EAAuByO,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCvO,EAAUqO,EAAkBrM,aAC5BqD,EAAegJ,EAAkB3H,kBACvC,OAAO8H,EAAAA,EAAAA,IAAwB5O,EAAWyF,EAAcrF,EAASiM,EACpE,CAAC,MAAMjD,GAEJ,OADA7H,QAAQC,KAAK,6EACN,CACV,C,CASLqN,uBAAAA,CAAwBzO,GACpB,OAAOyB,EAAAA,GAAQnB,WAAWN,E,CAQ9BqN,cAAAA,GACI,OAAO5L,EAAAA,GAAQiN,mB,CAQnBC,aAAAA,CAAc3O,GACV,IAEI,OADSyB,EAAAA,GAAQnB,WAAWN,IACrB,CACV,CAAC,MAAOgJ,GACL,OAAO,CACV,C,CAIL,sBAAMkB,CAAiBkC,EAAgBlO,EAAkBkC,EAAmC+D,GACxF,IACI,OAAO/D,aAAkBqL,EAAAA,GAAkBrL,EAASqL,EAAAA,GAAgBnL,WAAmBF,EAC1F,CAAC,MAAO4I,GACL,IACI,MAAMM,EAAiCjM,KAAKiM,eAC5C,aAA+BA,EAAesF,kBAAkBxC,GAAQ,EAAMlO,EAAQiG,EACzF,CAAC,MAAO6E,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CACJ,C,EAKT,SAAS0D,EAAqBJ,GAC1B,OAAOuC,EAAuBpJ,IAAI6G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOwC,EAAqBrJ,IAAI6G,GAAgBA,EAC5CzJ,EAAY,0BAA0ByJ,8FAC9C,CCjwCA,MAAM1H,EAAYmK,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAM7J,EAAgBa,EAAAA,GAAqBgJ,EAAS7J,cAEpD,IAAKA,EACD,MAAM,IAAIzI,MAAM,wBAA0BsS,EAAS7J,cAGvD,MAAO,CACHtB,KAAMmL,EAASnL,KACf6C,QAASsI,EAAStI,QAClBI,OAAQkI,EAASlI,OACjB2B,SAAUuG,EAASvG,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAagI,EAAQF,EAAAA,GAAS9H,eAC9BG,eAAgB6H,EAAQF,EAAAA,GAAS3H,kBACjCE,oBAAqB2H,EAAQF,EAAAA,GAASzH,uBACtCkB,YAAayG,EAAQF,EAAAA,GAASvG,eAC9BE,WAAYuG,EAAQF,EAAAA,GAASrG,cAC7BE,UAAWqG,EAAQF,EAAAA,GAASnG,aAC5BR,KAAM6G,EAAQF,EAAAA,GAAS3G,QACvBS,oBAAqBoG,EAAQF,EAAAA,GAASlG,uBACtCP,MAAO2G,EAAQF,EAAAA,GAASzG,SACxBZ,iBAAkBuH,EAAQF,EAAAA,GAASrH,oBACnCE,2BAA4BqH,EAAQF,EAAAA,GAASnH,8BAC7CE,gBAAiBmH,EAAQF,EAAAA,GAASjH,mBAClCE,0BAA2BiH,EAAQF,EAAAA,GAAS/G,6BAC5CE,2BAA4B+G,EAAQF,EAAAA,GAAS7G,8BAC7CY,cAAemG,EAAQF,EAAAA,GAASjG,iBAChCvC,OAAQ,SAAS3D,GACb,OAAIvF,KAAKoF,eAAeG,GACZvF,KAAauF,GAEd,IAAIhG,MAAM,QAAQgG,gB,GAK/BiM,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE1H,EAAmB,IAAI0H,IAAI,CAC7B,UACA,mBACA,oBAEExH,EAA6B,IAAIwH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEtH,EAAkB,IAAIsH,IAAI,CAC5B,SACA,kBACA,mBAEEpH,EAA4B,IAAIoH,IAAI,CACtC,mBACA,4BACA,2BAEElH,EAA6B,IAAIkH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAStM,EAAYgB,GAEjB,MADA1C,QAAQxD,MAAMkG,GACRA,CACV,C","sources":["webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts"],"sourcesContent":["export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n"],"names":["async","get","url","options","response","fetch","ok","Error","status","post","method","AleoNetworkClient","host","headers","account","constructor","this","setAccount","getAccount","setHost","fetchData","json","error","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","RecordCiphertext","fromString","value","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","console","warn","toString","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","message","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","undefined","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set"],"sourceRoot":""} \ No newline at end of file diff --git a/511.bundle.js b/511.bundle.js deleted file mode 100644 index 9f421ca14..000000000 --- a/511.bundle.js +++ /dev/null @@ -1,2 +0,0 @@ -(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[511],{4494:(_,t,e)=>{_.exports=e.p+"38c18e22c4f37629c446.wasm"},3645:(_,t,e)=>{_.exports=e.p+"f62b366a9b5fa66a5bcc.js"},6511:(_,t,e)=>{e.a(_,(async(_,r)=>{try{function n(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}let K;e.d(t,{$r:()=>B_,CK:()=>j,L:()=>W_,PD:()=>q_,SF:()=>j_,XV:()=>J_,YW:()=>N_,_q:()=>E_,fW:()=>I_,hz:()=>L_,zW:()=>U_});const C=new Array(128).fill(void 0);function i(_){return C[_]}C.push(void 0,null,!0,!1);let E=C.length;function o(_){_<132||(C[_]=E,E=_)}function a(_){const t=i(_);return o(_),t}const M="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&M.decode();let B=null;function s(){return null!==B&&B.buffer===K.memory.buffer||(B=new Uint8Array(K.memory.buffer)),B}function c(_,t){return _>>>=0,M.decode(s().slice(_,_+t))}function g(_){E===C.length&&C.push(C.length+1);const t=E;return E=C[t],C[t]=_,t}let U=0;const I="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},q=function(_,t){const e=I.encode(_);return t.set(e),{read:_.length,written:e.length}};function w(_,t,e){if(void 0===e){const e=I.encode(_),r=t(e.length,1)>>>0;return s().subarray(r,r+e.length).set(e),U=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=s();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=s().subarray(n+o,n+r);o+=q(_,t).written,n=e(n,r,o,1)>>>0}return U=o,n}function d(_){return null==_}let W=null;function b(){return null!==W&&W.buffer===K.memory.buffer||(W=new Int32Array(K.memory.buffer)),W}function l(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=l(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const $="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>{K.__wbindgen_export_3.get(_.dtor)(_.a,_.b)}));function u(_,t,e,r){const n={a:_,b:t,cnt:1,dtor:e},i=(..._)=>{n.cnt++;const t=n.a;n.a=0;try{return r(t,n.b,..._)}finally{0==--n.cnt?(K.__wbindgen_export_3.get(n.dtor)(t,n.b),$.unregister(n)):n.a=t}};return i.original=n,$.register(i,n,n),i}function f(_,t,e){K._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710(_,t,g(e))}function p(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function y(_,t){const e=t(1*_.length,1)>>>0;return s().set(_,e/1),U=_.length,e}function m(_,t,e,r){try{const o=K.__wbindgen_add_to_stack_pointer(-16);p(_,H),p(t,S_),p(e,g_);const s=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.verifyFunctionExecution(o,_.__wbg_ptr,t.__wbg_ptr,e.__wbg_ptr,s,c);var n=b()[o/4+0],i=b()[o/4+1];if(b()[o/4+2])throw a(i);return 0!==n}finally{K.__wbindgen_add_to_stack_pointer(16)}}let N=null;function h(){return null!==N&&N.buffer===K.memory.buffer||(N=new BigInt64Array(K.memory.buffer)),N}function v(_,t){return _>>>=0,s().subarray(_/1,_/1+t)}function k(_){K.runRayonThread(_)}function P(_,t){return a(K.initThreadPool(g(_),t))}function S(_,t){try{return _.apply(this,t)}catch(_){K.__wbindgen_exn_store(g(_))}}function x(_,t,e,r){K.wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a(_,t,g(e),g(r))}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_address_free(_>>>0)));let J=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,D.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_address_free(_)}static from_private_key(t){p(t,o_);const e=K.address_from_private_key(t.__wbg_ptr);return _.__wrap(e)}static from_view_key(t){p(t,V_);const e=K.address_from_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.address_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.address_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}verify(_,t){const e=y(_,K.__wbindgen_malloc),r=U;p(t,h_);return 0!==K.address_verify(this.__wbg_ptr,e,r,t.__wbg_ptr)}};const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_execution_free(_>>>0)));let H=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,L.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_execution_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.execution_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.execution_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_executionresponse_free(_>>>0)));let X=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Q.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Q.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_executionresponse_free(_)}getOutputs(){return a(K.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const _=K.executionresponse_getExecution(this.__wbg_ptr);return 0===_?void 0:H.__wrap(_)}getKeys(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getKeys(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return __.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const _=K.executionresponse_getProvingKey(this.__wbg_ptr);return 0===_?void 0:l_.__wrap(_)}getVerifyingKey(){const _=K.executionresponse_getVerifyingKey(this.__wbg_ptr);return S_.__wrap(_)}getFunctionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getFunctionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}getProgram(){const _=K.executionresponse_getProgram(this.__wbg_ptr);return g_.__wrap(_)}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_field_free(_>>>0)));let G=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Y.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_field_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.field_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.field_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_keypair_free(_>>>0)));class __{static __wrap(_){_>>>=0;const t=Object.create(__.prototype);return t.__wbg_ptr=_,Z.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_keypair_free(_)}constructor(_,t){p(_,l_);var e=_.__destroy_into_raw();p(t,S_);var r=t.__destroy_into_raw();const n=K.keypair_new(e,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_provingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return l_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_verifyingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return S_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}}const t_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_metadata_free(_>>>0)));let e_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,t_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,t_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_metadata_free(_)}get locator(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_locator(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set locator(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_locator(this.__wbg_ptr,t,e)}get prover(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_prover(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set prover(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_prover(this.__wbg_ptr,t,e)}get verifier(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifier(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifier(this.__wbg_ptr,t,e)}get verifyingKey(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifyingKey(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,e)}static baseUrl(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.metadata_baseUrl(n);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static bond_public(){const t=K.metadata_bond_public();return _.__wrap(t)}static bond_validator(){const t=K.metadata_bond_validator();return _.__wrap(t)}static claim_unbond_public(){const t=K.metadata_claim_unbond_public();return _.__wrap(t)}static fee_private(){const t=K.metadata_fee_private();return _.__wrap(t)}static fee_public(){const t=K.metadata_fee_public();return _.__wrap(t)}static inclusion(){const t=K.metadata_inclusion();return _.__wrap(t)}static join(){const t=K.metadata_join();return _.__wrap(t)}static set_validator_state(){const t=K.metadata_set_validator_state();return _.__wrap(t)}static split(){const t=K.metadata_split();return _.__wrap(t)}static transfer_private(){const t=K.metadata_transfer_private();return _.__wrap(t)}static transfer_private_to_public(){const t=K.metadata_transfer_private_to_public();return _.__wrap(t)}static transfer_public(){const t=K.metadata_transfer_public();return _.__wrap(t)}static transfer_public_as_signer(){const t=K.metadata_transfer_public_as_signer();return _.__wrap(t)}static transfer_public_to_private(){const t=K.metadata_transfer_public_to_private();return _.__wrap(t)}static unbond_public(){const t=K.metadata_unbond_public();return _.__wrap(t)}};const r_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_offlinequery_free(_>>>0)));let n_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,r_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,r_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_offlinequery_free(_)}constructor(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.offlinequery_new(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return this.__wbg_ptr=t>>>0,this}finally{K.__wbindgen_add_to_stack_pointer(16)}}addStatePath(_,t){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U,o=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,o,s);var e=b()[r/4+0];if(b()[r/4+1])throw a(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.offlinequery_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.offlinequery_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const i_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekey_free(_>>>0)));let o_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,i_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,i_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekey_free(_)}constructor(){const _=K.privatekey_new();return this.__wbg_ptr=_>>>0,this}static from_seed_unchecked(t){const e=y(t,K.__wbindgen_malloc),r=U,n=K.privatekey_from_seed_unchecked(e,r);return _.__wrap(n)}static from_string(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekey_from_string(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_view_key(){const _=K.privatekey_to_view_key(this.__wbg_ptr);return V_.__wrap(_)}to_address(){const _=K.privatekey_to_address(this.__wbg_ptr);return J.__wrap(_)}sign(_){const t=y(_,K.__wbindgen_malloc),e=U,r=K.privatekey_sign(this.__wbg_ptr,t,e);return h_.__wrap(r)}static newEncrypted(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_newEncrypted(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,s_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_fromPrivateKeyCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const a_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekeyciphertext_free(_>>>0)));let s_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,a_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,a_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekeyciphertext_free(_)}static encryptPrivateKey(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,o_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_toCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return o_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekeyciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekeyciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const c_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_program_free(_>>>0)));let g_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,c_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,c_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_program_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.program_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}hasFunction(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;return 0!==K.program_hasFunction(this.__wbg_ptr,t,e)}getFunctions(){return a(K.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_getMappings(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return a(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getRecordMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getStructMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=K.program_getCreditsProgram();return _.__wrap(t)}id(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_id(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}address(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_address(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return J.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){p(t,_);return 0!==K.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return a(K.program_getImports(this.__wbg_ptr))}};const w_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_programmanager_free(_>>>0)));let d_=class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,w_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_programmanager_free(_)}static buildDeploymentTransaction(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U;let u=0;d(r)||(p(r,y_),u=r.__destroy_into_raw());var f=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U;let m=0;d(o)||(p(o,l_),m=o.__destroy_into_raw());let h=0;d(s)||(p(s,S_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,n_),v=c.__destroy_into_raw());return a(K.programmanager_buildDeploymentTransaction(_.__wbg_ptr,b,l,e,u,f,y,d(i)?0:g(i),m,h,v))}static estimateDeploymentFee(_,t){const e=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;return a(K.programmanager_estimateDeploymentFee(e,r,d(t)?0:g(t)))}static estimateProgramNameCost(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.programmanager_estimateProgramNameCost(r,n,i);var t=h()[r/8+0],e=b()[r/4+2];if(b()[r/4+3])throw a(e);return BigInt.asUintN(64,t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(_,t,e,r,n,i,o,s,c,b,l){p(_,o_);const u=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U,y=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(s)||(p(s,l_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,S_),v=c.__destroy_into_raw());var k=d(b)?0:w(b,K.__wbindgen_malloc,K.__wbindgen_realloc),P=U;let S=0;d(l)||(p(l,n_),S=l.__destroy_into_raw());return a(K.programmanager_executeFunctionOffline(_.__wbg_ptr,u,f,y,m,g(r),n,i,d(o)?0:g(o),h,v,k,P,S))}static buildExecutionTransaction(_,t,e,r,n,i,o,s,c,b,l,u,f){p(_,o_);const y=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U,h=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),v=U;let k=0;d(i)||(p(i,y_),k=i.__destroy_into_raw());var P=d(o)?0:w(o,K.__wbindgen_malloc,K.__wbindgen_realloc),S=U;let x=0;d(c)||(p(c,l_),x=c.__destroy_into_raw());let V=0;d(b)||(p(b,S_),V=b.__destroy_into_raw());let F=0;d(l)||(p(l,l_),F=l.__destroy_into_raw());let T=0;d(u)||(p(u,S_),T=u.__destroy_into_raw());let R=0;d(f)||(p(f,n_),R=f.__destroy_into_raw());return a(K.programmanager_buildExecutionTransaction(_.__wbg_ptr,y,m,h,v,g(r),n,k,P,S,d(s)?0:g(s),x,V,F,T,R))}static estimateExecutionFee(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U,u=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U;var y=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,n_),k=c.__destroy_into_raw());return a(K.programmanager_estimateExecutionFee(_.__wbg_ptr,b,l,u,f,g(r),y,m,d(i)?0:g(i),h,v,k))}static estimateFinalizeFee(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.programmanager_estimateFinalizeFee(n,i,o,s,c);var e=h()[n/8+0],r=b()[n/4+2];if(b()[n/4+3])throw a(r);return BigInt.asUintN(64,e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(_,t,e,r,n,i,o,s,c,g,b){p(_,o_),p(t,y_);var l=t.__destroy_into_raw();p(e,y_);var u=e.__destroy_into_raw();let f=0;d(n)||(p(n,y_),f=n.__destroy_into_raw());var y=d(i)?0:w(i,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,l_),k=c.__destroy_into_raw());let P=0;d(g)||(p(g,S_),P=g.__destroy_into_raw());let S=0;d(b)||(p(b,n_),S=b.__destroy_into_raw());return a(K.programmanager_buildJoinTransaction(_.__wbg_ptr,l,u,r,f,y,m,h,v,k,P,S))}static buildSplitTransaction(_,t,e,r,n,i,o){p(_,o_),p(e,y_);var s=e.__destroy_into_raw(),c=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),g=U;let b=0;d(n)||(p(n,l_),b=n.__destroy_into_raw());let l=0;d(i)||(p(i,S_),l=i.__destroy_into_raw());let u=0;d(o)||(p(o,n_),u=o.__destroy_into_raw());return a(K.programmanager_buildSplitTransaction(_.__wbg_ptr,t,s,c,g,b,l,u))}static buildTransferTransaction(_,t,e,r,n,i,o,s,c,g,b,l,u,f){p(_,o_);const y=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U,h=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),v=U;var k=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),P=U;let S=0;d(i)||(p(i,y_),S=i.__destroy_into_raw());let x=0;d(s)||(p(s,y_),x=s.__destroy_into_raw());var V=d(c)?0:w(c,K.__wbindgen_malloc,K.__wbindgen_realloc),F=U;let T=0;d(g)||(p(g,l_),T=g.__destroy_into_raw());let R=0;d(b)||(p(b,S_),R=b.__destroy_into_raw());let z=0;d(l)||(p(l,l_),z=l.__destroy_into_raw());let A=0;d(u)||(p(u,S_),A=u.__destroy_into_raw());let O=0;d(f)||(p(f,n_),O=f.__destroy_into_raw());return a(K.programmanager_buildTransferTransaction(_.__wbg_ptr,t,y,m,h,v,k,P,S,o,x,V,F,T,R,z,A,O))}static synthesizeKeyPair(_,t,e,r,n){p(_,o_);const i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;return a(K.programmanager_synthesizeKeyPair(_.__wbg_ptr,i,o,s,c,g(r),d(n)?0:g(n)))}};const b_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_provingkey_free(_>>>0)));let l_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,b_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,b_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_provingkey_free(_)}isBondPublicProver(){return 0!==K.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==K.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==K.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==K.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==K.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==K.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==K.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==K.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==K.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==K.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==K.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==K.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==K.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==K.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==K.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.provingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.provingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.provingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const u_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordciphertext_free(_>>>0)));let f_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,u_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,u_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordciphertext_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}decrypt(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16);p(_,V_),K.recordciphertext_decrypt(r,this.__wbg_ptr,_.__wbg_ptr);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return y_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isOwner(_){p(_,V_);return 0!==K.recordciphertext_isOwner(this.__wbg_ptr,_.__wbg_ptr)}};const p_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordplaintext_free(_>>>0)));let y_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,p_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,p_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordplaintext_free(_)}commitment(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.recordplaintext_commitment(n,this.__wbg_ptr,i,o,s,c);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return G.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordplaintext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}microcredits(){const _=K.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,_)}nonce(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_nonce(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}serialNumberString(_,t,e){let r,n;try{const u=K.__wbindgen_add_to_stack_pointer(-16);p(_,o_);const f=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U,m=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),h=U;K.recordplaintext_serialNumberString(u,this.__wbg_ptr,_.__wbg_ptr,f,y,m,h);var i=b()[u/4+0],o=b()[u/4+1],s=b()[u/4+2],g=b()[u/4+3],d=i,l=o;if(g)throw d=0,l=0,a(s);return r=d,n=l,c(d,l)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(r,n,1)}}};const m_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_signature_free(_>>>0)));let h_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,m_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,m_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_signature_free(_)}static sign(t,e){p(t,o_);const r=y(e,K.__wbindgen_malloc),n=U,i=K.privatekey_sign(t.__wbg_ptr,r,n);return _.__wrap(i)}verify(_,t){p(_,J);const e=y(t,K.__wbindgen_malloc),r=U;return 0!==K.signature_verify(this.__wbg_ptr,_.__wbg_ptr,e,r)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.signature_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.signature_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const v_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_transaction_free(_>>>0)));let k_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,v_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,v_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_transaction_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.transaction_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionType(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionType(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const P_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_verifyingkey_free(_>>>0)));let S_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,P_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,P_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_verifyingkey_free(_)}static bondPublicVerifier(){const t=K.verifyingkey_bondPublicVerifier();return _.__wrap(t)}static bondValidatorVerifier(){const t=K.verifyingkey_bondValidatorVerifier();return _.__wrap(t)}static claimUnbondPublicVerifier(){const t=K.verifyingkey_claimUnbondPublicVerifier();return _.__wrap(t)}static feePrivateVerifier(){const t=K.verifyingkey_feePrivateVerifier();return _.__wrap(t)}static feePublicVerifier(){const t=K.verifyingkey_feePublicVerifier();return _.__wrap(t)}static inclusionVerifier(){const t=K.verifyingkey_inclusionVerifier();return _.__wrap(t)}static joinVerifier(){const t=K.verifyingkey_joinVerifier();return _.__wrap(t)}static setValidatorStateVerifier(){const t=K.verifyingkey_setValidatorStateVerifier();return _.__wrap(t)}static splitVerifier(){const t=K.verifyingkey_splitVerifier();return _.__wrap(t)}static transferPrivateVerifier(){const t=K.verifyingkey_transferPrivateVerifier();return _.__wrap(t)}static transferPrivateToPublicVerifier(){const t=K.verifyingkey_transferPrivateToPublicVerifier();return _.__wrap(t)}static transferPublicVerifier(){const t=K.verifyingkey_transferPublicVerifier();return _.__wrap(t)}static transferPublicAsSignerVerifier(){const t=K.verifyingkey_transferPublicAsSignerVerifier();return _.__wrap(t)}static transferPublicToPrivateVerifier(){const t=K.verifyingkey_transferPublicToPrivateVerifier();return _.__wrap(t)}static unbondPublicVerifier(){const t=K.verifyingkey_unbondPublicVerifier();return _.__wrap(t)}isBondPublicVerifier(){return 0!==K.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==K.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==K.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==K.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==K.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==K.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==K.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==K.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==K.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==K.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==K.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==K.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==K.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==K.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==K.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.verifyingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.verifyingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.verifyingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const x_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_viewkey_free(_>>>0)));let V_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,x_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,x_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_viewkey_free(_)}static from_private_key(t){p(t,o_);const e=K.privatekey_to_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.viewkey_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.viewkey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_address(){const _=K.address_from_view_key(this.__wbg_ptr);return J.__wrap(_)}decrypt(_){let t,e;try{const d=K.__wbindgen_add_to_stack_pointer(-16),l=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),u=U;K.viewkey_decrypt(d,this.__wbg_ptr,l,u);var r=b()[d/4+0],n=b()[d/4+1],i=b()[d/4+2],o=b()[d/4+3],s=r,g=n;if(o)throw s=0,g=0,a(i);return t=s,e=g,c(s,g)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(t,e,1)}}};async function V(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}function F(){const _={wbg:{}};return _.wbg.__wbindgen_object_drop_ref=function(_){a(_)},_.wbg.__wbg_new_71801a555ad9f2aa=function(){return S((function(){return g(new XMLHttpRequest)}),arguments)},_.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return S((function(_,t,e){i(_).overrideMimeType(c(t,e))}),arguments)},_.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return S((function(_,t,e,r,n,o){i(_).open(c(t,e),c(r,n),0!==o)}),arguments)},_.wbg.__wbg_send_80d29985093c1ec5=function(){return S((function(_){i(_).send()}),arguments)},_.wbg.__wbg_response_7c2e2759084f7279=function(){return S((function(_){return g(i(_).response)}),arguments)},_.wbg.__wbg_status_d485fb5a478426fb=function(){return S((function(_){return i(_).status}),arguments)},_.wbg.__wbg_new_72fb9a18b5ae2624=function(){return g(new Object)},_.wbg.__wbindgen_string_new=function(_,t){return g(c(_,t))},_.wbg.__wbg_set_1f9b04f170055d33=function(){return S((function(_,t,e){return Reflect.set(i(_),i(t),i(e))}),arguments)},_.wbg.__wbg_new_ab6fd82b10560829=function(){return S((function(){return g(new Headers)}),arguments)},_.wbg.__wbindgen_object_clone_ref=function(_){return g(i(_))},_.wbg.__wbg_new_0d76b0581eca6298=function(){return S((function(){return g(new AbortController)}),arguments)},_.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return g(i(_).signal)},_.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return S((function(_,t,e,r,n){i(_).append(c(t,e),c(r,n))}),arguments)},_.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=i(_)instanceof Response}catch(_){t=!1}return t},_.wbg.__wbg_status_61a01141acd3cf74=function(_){return i(_).status},_.wbg.__wbg_url_5f6dc4009ac5f99d=function(_,t){const e=w(i(t).url,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_headers_9620bfada380764a=function(_){return g(i(_).headers)},_.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return g(Symbol.iterator)},_.wbg.__wbg_get_e3c254076557e348=function(){return S((function(_,t){return g(Reflect.get(i(_),i(t)))}),arguments)},_.wbg.__wbindgen_is_function=function(_){return"function"==typeof i(_)},_.wbg.__wbg_call_27c0f87801dedf93=function(){return S((function(_,t){return g(i(_).call(i(t)))}),arguments)},_.wbg.__wbindgen_is_object=function(_){const t=i(_);return"object"==typeof t&&null!==t},_.wbg.__wbg_next_40fc327bfc8770e6=function(_){return g(i(_).next)},_.wbg.__wbg_next_196c84450b364254=function(){return S((function(_){return g(i(_).next())}),arguments)},_.wbg.__wbg_done_298b57d23c0fc80c=function(_){return i(_).done},_.wbg.__wbg_value_d93c65011f51a456=function(_){return g(i(_).value)},_.wbg.__wbg_abort_2aa7521d5690750e=function(_){i(_).abort()},_.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return S((function(_){return g(JSON.stringify(i(_)))}),arguments)},_.wbg.__wbindgen_string_get=function(_,t){const e=i(t),r="string"==typeof e?e:void 0;var n=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;b()[_/4+1]=o,b()[_/4+0]=n},_.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(c(_,t))},_.wbg.__wbindgen_bigint_from_u64=function(_){return g(BigInt.asUintN(64,_))},_.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return S((function(_,t,e){return g(i(_).call(i(t),i(e)))}),arguments)},_.wbg.__wbg_keypair_new=function(_){return g(__.__wrap(_))},_.wbg.__wbindgen_module=function(){return g(A.__wbindgen_wasm_module)},_.wbg.__wbindgen_memory=function(){return g(K.memory)},_.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,e,r){return g(n(i(_),i(t),i(e),r>>>0))},_.wbg.__wbg_executionresponse_new=function(_){return g(X.__wrap(_))},_.wbg.__wbg_transaction_new=function(_){return g(k_.__wrap(_))},_.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return g(new Array(_>>>0))},_.wbg.__wbg_set_d4638f722068f043=function(_,t,e){i(_)[t>>>0]=a(e)},_.wbg.__wbindgen_cb_drop=function(_){const t=a(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},_.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return g(new Array)},_.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return i(_).push(i(t))},_.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return S((function(_){return g(i(_).arrayBuffer())}),arguments)},_.wbg.__wbg_new_63b92bc8671ed464=function(_){return g(new Uint8Array(i(_)))},_.wbg.__wbg_length_c20a40f15020d68a=function(_){return i(_).length},_.wbg.__wbg_new_81740750da40724f=function(_,t){try{var e={a:_,b:t};const r=new Promise(((_,t)=>{const r=e.a;e.a=0;try{return x(r,e.b,_,t)}finally{e.a=r}}));return g(r)}finally{e.a=e.b=0}},_.wbg.__wbindgen_number_new=function(_){return g(_)},_.wbg.__wbg_new_abda76e883ba8a5f=function(){return g(new Error)},_.wbg.__wbg_stack_658279fe44541cf6=function(_,t){const e=w(i(t).stack,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_error_f851667af71bcfc6=function(_,t){let e,r;try{e=_,r=t,console.error(c(_,t))}finally{K.__wbindgen_free(e,r,1)}},_.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return g(i(_).buffer)},_.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,e){return g(new Uint8Array(i(_),t>>>0,e>>>0))},_.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return S((function(_,t){i(_).randomFillSync(a(t))}),arguments)},_.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,e){return g(i(_).subarray(t>>>0,e>>>0))},_.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return S((function(_,t){i(_).getRandomValues(i(t))}),arguments)},_.wbg.__wbg_set_a47bac70306a19a7=function(_,t,e){i(_).set(i(t),e>>>0)},_.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return g(i(_).crypto)},_.wbg.__wbg_process_4a72847cc503995b=function(_){return g(i(_).process)},_.wbg.__wbg_versions_f686565e586dd935=function(_){return g(i(_).versions)},_.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return g(i(_).node)},_.wbg.__wbindgen_is_string=function(_){return"string"==typeof i(_)},_.wbg.__wbg_require_cca90b1a94a0255b=function(){return S((function(){return g(module.require)}),arguments)},_.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return g(i(_).msCrypto)},_.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return g(new Uint8Array(_>>>0))},_.wbg.__wbg_length_cd7af8117672b8b8=function(_){return i(_).length},_.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return g(i(_)[t>>>0])},_.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return S((function(){return g(self.self)}),arguments)},_.wbg.__wbg_window_c6fb939a7f436783=function(){return S((function(){return g(window.window)}),arguments)},_.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return S((function(){return g(globalThis.globalThis)}),arguments)},_.wbg.__wbg_global_207b558942527489=function(){return S((function(){return g(global.global)}),arguments)},_.wbg.__wbindgen_is_undefined=function(_){return void 0===i(_)},_.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return g(new Function(c(_,t)))},_.wbg.__wbg_has_0af94d20077affa2=function(){return S((function(_,t){return Reflect.has(i(_),i(t))}),arguments)},_.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return g(fetch(i(_)))},_.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return g(i(_).fetch(i(t)))},_.wbg.__wbindgen_debug_string=function(_,t){const e=w(l(i(t)),K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbindgen_throw=function(_,t){throw new Error(c(_,t))},_.wbg.__wbindgen_rethrow=function(_){throw a(_)},_.wbg.__wbg_then_a73caa9a87991566=function(_,t,e){return g(i(_).then(i(t),i(e)))},_.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return g(i(_).then(i(t)))},_.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(i(_))},_.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return g(i(_).queueMicrotask)},_.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return g(Promise.resolve(i(_)))},_.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return g(Atomics.waitAsync)},_.wbg.__wbg_new_8cccba86b0f574cb=function(_){return g(new Int32Array(i(_)))},_.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,e){return g(Atomics.waitAsync(i(_),t,e))},_.wbg.__wbg_async_19c0400d97cc72fe=function(_){return i(_).async},_.wbg.__wbg_value_571d60108110e917=function(_){return g(i(_).value)},_.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(_){const t=w("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;b()[_/4+1]=e,b()[_/4+0]=t},_.wbg.__wbg_new_d1187ae36d662ef9=function(){return S((function(_,t){return g(new Worker(c(_,t)))}),arguments)},_.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){i(_).onmessage=i(t)},_.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,e){return g(Array.of(i(_),i(t),i(e)))},_.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return S((function(_,t){i(_).postMessage(i(t))}),arguments)},_.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return g(i(_).data)},_.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return S((function(_,t,e){return g(new Request(c(_,t),i(e)))}),arguments)},_.wbg.__wbg_responseText_c67ed2d48db10769=function(){return S((function(_,t){const e=i(t).responseText;var r=d(e)?0:w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),n=U;b()[_/4+1]=n,b()[_/4+0]=r}),arguments)},_.wbg.__wbindgen_closure_wrapper5763=function(_,t,e){return g(u(_,t,538,f))},_.wbg.__wbindgen_closure_wrapper5788=function(_,t,e){return g(u(_,t,538,f))},_}function T(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(_,t){return K=_.exports,A.__wbindgen_wasm_module=t,N=null,W=null,B=null,K.__wbindgen_start(),K}function z(_,t){if(void 0!==K)return K;const e=F();T(e,t),_ instanceof WebAssembly.Module||(_=new WebAssembly.Module(_));return R(new WebAssembly.Instance(_,e),_)}async function A(_,t){if(void 0!==K)return K;const e=F();("string"==typeof _||"function"==typeof Request&&_ instanceof Request||"function"==typeof URL&&_ instanceof URL)&&(_=fetch(_)),T(e,t);const{instance:r,module:n}=await V(await _,e);return R(r,n)}var O=Object.freeze({__proto__:null,Address:J,Execution:H,ExecutionResponse:X,Field:G,KeyPair:__,Metadata:e_,OfflineQuery:n_,PrivateKey:o_,PrivateKeyCiphertext:s_,Program:g_,ProgramManager:d_,ProvingKey:l_,RecordCiphertext:f_,RecordPlaintext:y_,Signature:h_,Transaction:k_,VerifyingKey:S_,ViewKey:V_,default:A,initSync:z,initThreadPool:P,runRayonThread:k,verifyFunctionExecution:m});const F_="assets/aleo_wasm.wasm";const{initThreadPool:T_,Address:R_,Execution:z_,ExecutionResponse:A_,Field:O_,Metadata:j_,OfflineQuery:K_,Private:C_,PrivateKey:E_,PrivateKeyCiphertext:M_,Program:B_,ProvingKey:U_,RecordCiphertext:I_,RecordPlaintext:q_,ProgramManager:W_,Signature:$_,Transaction:N_,ViewKey:D_,VerifyingKey:J_,verifyFunctionExecution:L_}=await(async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n=F_;return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(A,n):await A(n),O})({importHook:()=>new URL(e(4494),e.b)});async function j(_){null==_&&(_=navigator.hardwareConcurrency),console.info(`Spawning ${_} threads`),await T_(new URL(e(3645),e.b),_)}r()}catch(H_){r(H_)}}),1)}}]); -//# sourceMappingURL=511.bundle.js.map \ No newline at end of file diff --git a/511.bundle.js.map b/511.bundle.js.map deleted file mode 100644 index eefe12c56..000000000 --- a/511.bundle.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"511.bundle.js","mappings":"wOAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,E,qHAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR9D,EACA,MAAQ,IAAG8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EACjC,YAAW+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACP,GAAEoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAO,wBAAuB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,K,MAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,K,MAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,K,MAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,GAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,K,MAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,GAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,GAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,GAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,K,OAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,GAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,GAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,WAAIkL,GACA,IAAIpD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK2M,2BAA2BvG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAImD,CAAQzH,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK4M,2BAA2BhF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAIiG,GACA,IAAIvD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8M,0BAA0B1G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIsD,CAAO5H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK+M,0BAA0BnF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIoG,GACA,IAAI1D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiN,4BAA4B7G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAIyD,CAAS/H,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKkN,4BAA4BtF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,gCAAgC/G,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,gCAAgCxF,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAOyG,GACH,IAAI/D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsN,iBAAiBlH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOgE,GACH,MAAM3M,EAAMZ,EAAKwN,uBACjB,OAAOf,EAASpE,OAAOzH,EAC/B,CAII,qBAAO6M,GACH,MAAM7M,EAAMZ,EAAK0N,0BACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,0BAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,+BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,uBACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,sBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,qBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,WAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,gBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,0BAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,+BACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,YAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,iBACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,uBAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,4BACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,iCAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,sCACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,2BACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,qCACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,sCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,oBAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,yBACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,GAGA,MAAMyO,GAA4D,oBAAzB9K,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsP,wBAAwB9N,IAAQ,K,OAK3E,MAAM+N,EAEF,aAAOlH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgH,EAAa/G,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB6N,GAAyB7K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuI,GAAyB5K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsP,wBAAwB9N,EACrC,CAKIuK,WAAAA,CAAYyD,GACR,IACI,MAAMpJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgN,EAAYxP,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKyP,iBAAiBrJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIqJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAMxJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmN,EAAY3P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBoN,EAAY5P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEkJ,EAAOhO,EACb7B,EAAK8P,0BAA0B1J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM4D,GACzE,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+P,sBAAsB3J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAW8F,GACd,IACI,MAAM5J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwN,EAAGhQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKiQ,wBAAwB7J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuI,EAAalH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM6J,GAA0D,oBAAzB3L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmQ,sBAAsB3O,IAAQ,K,OAIzE,MAAM4O,EAEF,aAAO/H,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6H,EAAW5H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0O,GAAuB1L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoJ,GAAuBzL,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmQ,sBAAsB3O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKqQ,iBAEjB,OADAzI,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO0I,CAAoBC,GACvB,MAAM9J,EAAOX,EAAkByK,EAAMvQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAKwQ,+BAA+B/J,EAAMG,GACtD,OAAOwJ,EAAW/H,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKyQ,uBAAuBrK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoJ,EAAW/H,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0Q,qBAAqBtK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIoH,WAAAA,GACI,MAAM/P,EAAMZ,EAAK4Q,uBAAuBhJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOIiQ,UAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,sBAAsBlJ,KAAKd,WAC5C,OAAOiK,EAAQ1I,OAAOzH,EAC9B,CASIoQ,IAAAA,CAAK5M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKiR,gBAAgBrJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOsQ,CAAaC,GAChB,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKoR,wBAAwBhL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqK,GAAqBhJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUIiL,YAAAA,CAAaH,GACT,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKuR,wBAAwBnL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqK,GAAqBhJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOmL,CAAyBC,EAAYN,GACxC,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAa8L,EAAYJ,IACzB,MAAM5K,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK0R,oCAAoCtL,EAAQqL,EAAW3K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoJ,EAAW/H,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMsL,GAAoE,oBAAzBpN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4R,gCAAgCpQ,IAAQ,K,OAInF,MAAMqQ,EAEF,aAAOxJ,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsJ,EAAqBrJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBmQ,GAAiCnN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6K,GAAiClN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4R,gCAAgCpQ,EAC7C,CAYI,wBAAOsQ,CAAkBlJ,EAAauI,GAClC,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKuR,wBAAwBnL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6K,EAAqBxJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI0L,mBAAAA,CAAoBZ,GAChB,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKgS,yCAAyC5L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,GAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiS,8BAA8B7L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWuH,GACd,IACI,MAAMrL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiP,EAAYzR,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKkS,gCAAgC9L,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6K,EAAqBxJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM8L,GAAuD,oBAAzB5N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoS,mBAAmB5Q,IAAQ,K,OAItE,MAAM6Q,EAEF,aAAOhK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO8J,EAAQ7J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB2Q,GAAoB3N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqL,GAAoB1N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoS,mBAAmB5Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKsS,mBAAmBlM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqL,EAAQhK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKuS,iBAAiBnM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASIiJ,WAAAA,CAAYC,GACR,MAAMhM,EAAOjE,EAAkBiQ,EAAezS,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK0S,oBAAoB9K,KAAKd,UAAWL,EAAMG,EAEnE,CAuBI+L,YAAAA,GAEI,OAAOhS,EADKX,EAAK4S,qBAAqBhL,KAAKd,WAEnD,CAyCI+L,iBAAAA,CAAkBJ,GACd,IACI,MAAMrM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiQ,EAAezS,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAK8S,0BAA0B1M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI0M,WAAAA,GACI,IACI,MAAM3M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgT,oBAAoB5M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI4M,gBAAAA,CAAiBC,GACb,IACI,MAAM9M,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKmT,yBAAyB/M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDI+M,gBAAAA,CAAiBC,GACb,IACI,MAAMjN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6Q,EAAarT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKsT,yBAAyBlN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOkN,GACH,MAAM3S,EAAMZ,EAAKwT,4BACjB,OAAOnB,EAAQhK,OAAOzH,EAC9B,CAOI6S,EAAAA,GACI,IAAInK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0T,WAAWtN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK2T,gBAAgBvN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+J,EAAQ1I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIuN,OAAAA,CAAQC,GACJlO,EAAakO,EAAOxB,GAEpB,OAAe,IADHrS,EAAK8T,gBAAgBlM,KAAKd,UAAW+M,EAAM/M,UAE/D,CA0BIiN,UAAAA,GAEI,OAAOpT,EADKX,EAAKgU,mBAAmBpM,KAAKd,WAEjD,GAGA,MAAMmN,GAA8D,oBAAzB1P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkU,0BAA0B1S,IAAQ,K,OAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmN,GAA2BxP,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkU,0BAA0B1S,EACvC,CA8BI,iCAAO2S,CAA2BvL,EAAa1C,EAASkO,EAAaC,EAAYrV,EAAKsV,EAASC,EAAiBC,EAAmBC,GAC/H9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBzI,EAAOoI,EAAW5L,sBAEtB,IAAIkM,EAAO3R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9B6J,EAAON,EAAgB9L,sBAE3B,IAAIqM,EAAO,EACN9R,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChCuO,EAAON,EAAkB/L,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKiV,0CAA0CrM,EAAY9B,UAAWL,EAAMG,EAAMwN,EAAanI,EAAM0I,EAAMC,EAAM5R,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBhP,EAASoO,GAClC,MAAM7N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKmV,qCAAqC1O,EAAMG,EAAM5D,EAAWsR,GAAW,EAAI3S,EAAc2S,IAElH,CAaI,8BAAOc,CAAwB5R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKqV,uCAAuCjP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,OAAOC,OAAOC,QAAQ,GAAIzO,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOoP,CAAuB7M,EAAa1C,EAASwP,EAAWC,EAAQC,EAAiBC,EAAOvB,EAAStI,EAAa/F,EAAejH,EAAKyV,GACrI9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO,EACN3R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B2J,EAAO3I,EAAYvD,sBAEvB,IAAIoM,EAAO,EACN7R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BsO,EAAO5O,EAAcwC,sBAEzB,IAAIqM,EAAO9R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmP,EAAOjU,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAK+V,sCAAsCnN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAASC,EAAiBC,EAAO7S,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BpN,EAAa1C,EAASwP,EAAWC,EAAQvB,EAAaC,EAAYrV,EAAKsV,EAAStI,EAAa/F,EAAesO,EAAiBC,EAAmBC,GAC7K9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO,EACN3R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBC,EAAON,EAAW5L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFsP,EAAOpU,EACX,IAAIiT,EAAO,EACN9R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B8J,EAAO9I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIyN,EAAO,EACNlT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BkL,EAAO3B,EAAgB9L,sBAE3B,IAAI0N,EAAO,EACNnT,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChC4P,EAAO3B,EAAkB/L,sBAE7B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BoB,EAAO3B,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKqW,yCAAyCzN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMjT,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB1N,EAAa1C,EAASwP,EAAWC,EAAQ3W,EAAKsV,EAAStI,EAAa/F,EAAewO,GAC3G9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO3R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIqM,EAAO,EACN9R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BuO,EAAO7O,EAAcwC,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKuW,oCAAoC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAAShB,EAAMC,EAAM5R,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBtQ,EAASwP,GAChC,IACI,MAAMtP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb7B,EAAKyW,mCAAmCrQ,EAAQK,EAAMG,EAAMqF,EAAM4D,GAClE,IAAI9I,EAAKG,IAAqBd,EAAS,EAAI,GACvCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,OAAOC,OAAOC,QAAQ,GAAIzO,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOqQ,CAAqB9N,EAAa+N,EAAUC,EAAUxC,EAAaC,EAAYrV,EAAK6X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjK9O,EAAaiD,EAAaC,IAC1BlD,EAAagR,EAAUjC,IACvB,IAAIjO,EAAOkQ,EAASlO,qBACpB9C,EAAaiR,EAAUlC,IACvB,IAAIzI,EAAO2K,EAASnO,qBACpB,IAAIkM,EAAO,EACN3R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBC,EAAON,EAAW5L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFsP,EAAOpU,EACX,IAAIiT,EAAO,EACN9R,EAAW6T,KACZlR,EAAakR,EAAkB7L,IAC/B8J,EAAO+B,EAAiBpO,sBAE5B,IAAIsM,EAAO,EACN/R,EAAW8T,KACZnR,EAAamR,EAAoBvQ,IACjCwO,EAAO+B,EAAmBrO,sBAE9B,IAAIyN,EAAO,EACNlT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BkL,EAAO3B,EAAgB9L,sBAE3B,IAAI0N,EAAO,EACNnT,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChC4P,EAAO3B,EAAkB/L,sBAE7B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BoB,EAAO3B,EAAchM,sBAGzB,OAAO9H,EADKX,EAAK+W,oCAAoCnO,EAAY9B,UAAWL,EAAMwF,EAAMmI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBpO,EAAaqO,EAAcC,EAAelY,EAAKmY,EAAmBC,EAAqB3C,GAChH9O,EAAaiD,EAAaC,IAC1BlD,EAAauR,EAAexC,IAC5B,IAAIjO,EAAOyQ,EAAczO,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACX,IAAI8S,EAAO,EACN3R,EAAWmU,KACZxR,EAAawR,EAAmBnM,IAChC2J,EAAOwC,EAAkB1O,sBAE7B,IAAIoM,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAqB7Q,IAClCsO,EAAOuC,EAAoB3O,sBAE/B,IAAIqM,EAAO,EACN9R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BF,EAAOL,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKqX,qCAAqCzO,EAAY9B,UAAWmQ,EAAcxQ,EAAMwF,EAAM4D,EAAM8E,EAAME,EAAMC,GAEjI,CAiCI,+BAAOwC,CAAyB1O,EAAa2O,EAAgBC,EAAWC,EAAeC,EAAQR,EAAe9C,EAAaC,EAAYrV,EAAK2Y,EAAsBC,EAAwBrD,EAAiBC,EAAmBC,GAC1N9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBgV,EAAWxX,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBiV,EAAezX,EAAK0G,kBAAmB1G,EAAK2G,oBACrEkJ,EAAOhO,EACb,IAAI8S,EAAO3R,EAAW0U,GAAU,EAAIlV,EAAkBkV,EAAQ1X,EAAK0G,kBAAmB1G,EAAK2G,oBACvFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWkU,KACZvR,EAAauR,EAAexC,IAC5BG,EAAOqC,EAAczO,sBAEzB,IAAIqM,EAAO,EACN9R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBI,EAAOT,EAAW5L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkR,EAAOhW,EACX,IAAIqU,EAAO,EACNlT,EAAW2U,KACZhS,EAAagS,EAAsB3M,IACnCkL,EAAOyB,EAAqBlP,sBAEhC,IAAI0N,EAAO,EACNnT,EAAW4U,KACZjS,EAAaiS,EAAwBrR,IACrC4P,EAAOyB,EAAuBnP,sBAElC,IAAI2N,EAAO,EACNpT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BoL,EAAO7B,EAAgB9L,sBAE3B,IAAIqP,EAAO,EACN9U,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChCuR,EAAOtD,EAAkB/L,sBAE7B,IAAIsP,EAAQ,EACP/U,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5B+C,EAAQtD,EAAchM,sBAG1B,OAAO9H,EADKX,EAAKgY,wCAAwCpP,EAAY9B,UAAWyQ,EAAgB9Q,EAAMG,EAAMqF,EAAM4D,EAAM8E,EAAMC,EAAMC,EAAMT,EAAaU,EAAMC,EAAM8C,EAAM3B,EAAMC,EAAMC,EAAM0B,EAAMC,GAEzM,CAeI,wBAAOE,CAAkBrP,EAAa1C,EAASC,EAAawP,EAAQrB,GAChE3O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EAEb,OAAOlB,EADKX,EAAKkY,iCAAiCtP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAAS3S,EAAWsR,GAAW,EAAI3S,EAAc2S,IAExK,GAGA,MAAM6D,GAA0D,oBAAzB5T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoY,sBAAsB5W,IAAQ,K,OAIzE,MAAM6W,EAEF,aAAOhQ,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO8P,EAAW7P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB2W,GAAuB3T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqR,GAAuB1T,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoY,sBAAsB5W,EACnC,CAWI8W,kBAAAA,GAEI,OAAe,IADHtY,EAAKuY,8BAA8B3Q,KAAKd,UAE5D,CAWI0R,qBAAAA,GAEI,OAAe,IADHxY,EAAKyY,iCAAiC7Q,KAAKd,UAE/D,CAWI4R,yBAAAA,GAEI,OAAe,IADH1Y,EAAK2Y,qCAAqC/Q,KAAKd,UAEnE,CAWI8R,kBAAAA,GAEI,OAAe,IADH5Y,EAAK6Y,8BAA8BjR,KAAKd,UAE5D,CAWIgS,iBAAAA,GAEI,OAAe,IADH9Y,EAAK+Y,6BAA6BnR,KAAKd,UAE3D,CAWIkS,iBAAAA,GAEI,OAAe,IADHhZ,EAAKiZ,6BAA6BrR,KAAKd,UAE3D,CAWIoS,YAAAA,GAEI,OAAe,IADHlZ,EAAKmZ,wBAAwBvR,KAAKd,UAEtD,CAWIsS,yBAAAA,GAEI,OAAe,IADHpZ,EAAKqZ,qCAAqCzR,KAAKd,UAEnE,CAWIwS,aAAAA,GAEI,OAAe,IADHtZ,EAAKuZ,yBAAyB3R,KAAKd,UAEvD,CAWI0S,uBAAAA,GAEI,OAAe,IADHxZ,EAAKyZ,mCAAmC7R,KAAKd,UAEjE,CAWI4S,+BAAAA,GAEI,OAAe,IADH1Z,EAAK2Z,2CAA2C/R,KAAKd,UAEzE,CAWI8S,sBAAAA,GAEI,OAAe,IADH5Z,EAAK6Z,kCAAkCjS,KAAKd,UAEhE,CAWIgT,8BAAAA,GAEI,OAAe,IADH9Z,EAAK+Z,0CAA0CnS,KAAKd,UAExE,CAWIkT,+BAAAA,GAEI,OAAe,IADHha,EAAKia,2CAA2CrS,KAAKd,UAEzE,CAWIoT,oBAAAA,GAEI,OAAe,IADHla,EAAKma,gCAAgCvS,KAAKd,UAE9D,CAOIsT,QAAAA,GACI,IAAI9Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqa,oBAAoBjU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI+Q,IAAAA,GACI,MAAM1Z,EAAMZ,EAAKua,gBAAgB3S,KAAKd,WACtC,OAAOuR,EAAWhQ,OAAOzH,EACjC,CASI,gBAAO4Z,CAAUC,GACb,IACI,MAAMrU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB2U,EAAOza,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK0a,qBAAqBtU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqR,EAAWhQ,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWyQ,GACd,IACI,MAAMvU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmY,EAAQ3a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4a,sBAAsBxU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqR,EAAWhQ,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIwU,OAAAA,GACI,IACI,MAAMzU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8a,mBAAmB1U,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,IAAIyF,EAAK3T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B+T,CACnB,CAAU,QACE/a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgb,oBAAoB5U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0R,GAAgE,oBAAzB1W,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkb,4BAA4B1Z,IAAQ,K,OAI/E,MAAM2Z,EAEF,aAAO9S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO4S,EAAiB3S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChByZ,GAA6BzW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmU,GAA6BxW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkb,4BAA4B1Z,EACzC,CASI,iBAAO0I,CAAWkR,GACd,IACI,MAAMhV,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Y,EAAQpb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKqb,4BAA4BjV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOmU,EAAiB9S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsb,0BAA0BlV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIgS,OAAAA,CAAQvS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKwb,yBAAyBpV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO0N,GAAgBrM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIoV,OAAAA,CAAQzS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAK0b,yBAAyB9T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM6U,GAA+D,oBAAzBpX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4b,2BAA2Bpa,IAAQ,K,OAI9E,MAAMqa,EAEF,aAAOxT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsT,EAAgBrT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBma,GAA4BnX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6U,GAA4BlX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4b,2BAA2Bpa,EACxC,CAMImO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAM9M,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkR,EAAY1T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EACb7B,EAAK8b,2BAA2B1V,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM4D,GAC1E,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+U,EAAM1T,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWkR,GACd,IACI,MAAMhV,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Y,EAAQpb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKgc,2BAA2B5V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6U,EAAgBxT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKic,yBAAyB7V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI2S,YAAAA,GACI,MAAMtb,EAAMZ,EAAKmc,6BAA6BvU,KAAKd,WACnD,OAAOyO,OAAOC,QAAQ,GAAI5U,EAClC,CAOIwb,KAAAA,GACI,IAAI9S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqc,sBAAsBjW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI+S,kBAAAA,CAAmB1T,EAAa8K,EAAYR,GACxC,IAAIqJ,EACAC,EACJ,IACI,MAAMpW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBkR,EAAY1T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EACb7B,EAAKyc,mCAAmCrW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,GACzG,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GACpCsW,EAAKvZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACPkP,EAAOjP,EACX,GAAI0V,EAEA,MADA7H,EAAO,EAAGoB,EAAO,EACXtV,EAAW2U,GAIrB,OAFAiH,EAAc1H,EACd2H,EAAcvG,EACP1U,EAAmBsT,EAAMoB,EAC5C,CAAU,QACEjW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB8S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBpY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4c,qBAAqBpb,IAAQ,K,OAIxE,MAAMqb,EAEF,aAAOxU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsU,EAAUrU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBmb,GAAsBnY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6V,GAAsBlY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4c,qBAAqBpb,EAClC,CAWI,WAAOwP,CAAKpI,EAAaxE,GACrBuB,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKiR,gBAAgBrI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOiW,EAAUxU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS4R,GACtB,MAAMtK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK8c,iBAAiBlV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK+c,sBAAsBtW,EAAMG,GAC7C,OAAOiW,EAAUxU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgd,oBAAoB5W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0T,GAA2D,oBAAzB1Y,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkd,uBAAuB1b,IAAQ,K,OAO1E,MAAM2b,EAEF,aAAO9U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO4U,EAAY3U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChByb,GAAwBzY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmW,GAAwBxY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkd,uBAAuB1b,EACpC,CASI,iBAAO0I,CAAWkT,GACd,IACI,MAAMhX,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4a,EAAapd,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqd,uBAAuBjX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOmW,EAAY9U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsd,qBAAqBlX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWIgU,aAAAA,GACI,IAAIjU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwd,0BAA0BpX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIkU,eAAAA,GACI,IAAInU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0d,4BAA4BtX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMoU,GAA4D,oBAAzBpZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4d,wBAAwBpc,IAAQ,K,OAI3E,MAAMqc,EAEF,aAAOxV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsV,EAAarV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBmc,GAAyBnZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6W,GAAyBlZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4d,wBAAwBpc,EACrC,CAOI,yBAAOsc,GACH,MAAMld,EAAMZ,EAAK+d,kCACjB,OAAOF,EAAaxV,OAAOzH,EACnC,CAOI,4BAAOod,GACH,MAAMpd,EAAMZ,EAAKie,qCACjB,OAAOJ,EAAaxV,OAAOzH,EACnC,CAOI,gCAAOsd,GACH,MAAMtd,EAAMZ,EAAKme,yCACjB,OAAON,EAAaxV,OAAOzH,EACnC,CAOI,yBAAOwd,GACH,MAAMxd,EAAMZ,EAAKqe,kCACjB,OAAOR,EAAaxV,OAAOzH,EACnC,CAOI,wBAAO0d,GACH,MAAM1d,EAAMZ,EAAKue,iCACjB,OAAOV,EAAaxV,OAAOzH,EACnC,CAOI,wBAAO4d,GACH,MAAM5d,EAAMZ,EAAKye,iCACjB,OAAOZ,EAAaxV,OAAOzH,EACnC,CAOI,mBAAO8d,GACH,MAAM9d,EAAMZ,EAAK2e,4BACjB,OAAOd,EAAaxV,OAAOzH,EACnC,CAOI,gCAAOge,GACH,MAAMhe,EAAMZ,EAAK6e,yCACjB,OAAOhB,EAAaxV,OAAOzH,EACnC,CAOI,oBAAOke,GACH,MAAMle,EAAMZ,EAAK+e,6BACjB,OAAOlB,EAAaxV,OAAOzH,EACnC,CAOI,8BAAOoe,GACH,MAAMpe,EAAMZ,EAAKif,uCACjB,OAAOpB,EAAaxV,OAAOzH,EACnC,CAOI,sCAAOse,GACH,MAAMte,EAAMZ,EAAKmf,+CACjB,OAAOtB,EAAaxV,OAAOzH,EACnC,CAOI,6BAAOwe,GACH,MAAMxe,EAAMZ,EAAKqf,sCACjB,OAAOxB,EAAaxV,OAAOzH,EACnC,CAOI,qCAAO0e,GACH,MAAM1e,EAAMZ,EAAKuf,8CACjB,OAAO1B,EAAaxV,OAAOzH,EACnC,CAOI,sCAAO4e,GACH,MAAM5e,EAAMZ,EAAKyf,+CACjB,OAAO5B,EAAaxV,OAAOzH,EACnC,CAOI,2BAAO8e,GACH,MAAM9e,EAAMZ,EAAK2f,oCACjB,OAAO9B,EAAaxV,OAAOzH,EACnC,CAOIgf,oBAAAA,GAEI,OAAe,IADH5f,EAAK6f,kCAAkCjY,KAAKd,UAEhE,CAOIgZ,uBAAAA,GAEI,OAAe,IADH9f,EAAK+f,qCAAqCnY,KAAKd,UAEnE,CAOIkZ,2BAAAA,GAEI,OAAe,IADHhgB,EAAKigB,yCAAyCrY,KAAKd,UAEvE,CAOIoZ,oBAAAA,GAEI,OAAe,IADHlgB,EAAKmgB,kCAAkCvY,KAAKd,UAEhE,CAOIsZ,mBAAAA,GAEI,OAAe,IADHpgB,EAAKqgB,iCAAiCzY,KAAKd,UAE/D,CAOIwZ,mBAAAA,GAEI,OAAe,IADHtgB,EAAKugB,iCAAiC3Y,KAAKd,UAE/D,CAOI0Z,cAAAA,GAEI,OAAe,IADHxgB,EAAKygB,4BAA4B7Y,KAAKd,UAE1D,CAOI4Z,2BAAAA,GAEI,OAAe,IADH1gB,EAAK2gB,yCAAyC/Y,KAAKd,UAEvE,CAOI8Z,eAAAA,GAEI,OAAe,IADH5gB,EAAK6gB,6BAA6BjZ,KAAKd,UAE3D,CAOIga,yBAAAA,GAEI,OAAe,IADH9gB,EAAK+gB,uCAAuCnZ,KAAKd,UAErE,CAOIka,iCAAAA,GAEI,OAAe,IADHhhB,EAAKihB,+CAA+CrZ,KAAKd,UAE7E,CAOIoa,wBAAAA,GAEI,OAAe,IADHlhB,EAAKmhB,sCAAsCvZ,KAAKd,UAEpE,CAOIsa,gCAAAA,GAEI,OAAe,IADHphB,EAAKqhB,8CAA8CzZ,KAAKd,UAE5E,CAOIwa,iCAAAA,GAEI,OAAe,IADHthB,EAAKuhB,+CAA+C3Z,KAAKd,UAE7E,CAOI0a,sBAAAA,GAEI,OAAe,IADHxhB,EAAKyhB,oCAAoC7Z,KAAKd,UAElE,CAOIsT,QAAAA,GACI,IAAI9Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0hB,sBAAsBtb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI+Q,IAAAA,GACI,MAAM1Z,EAAMZ,EAAK2hB,kBAAkB/Z,KAAKd,WACxC,OAAO+W,EAAaxV,OAAOzH,EACnC,CASI,gBAAO4Z,CAAUC,GACb,IACI,MAAMrU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB2U,EAAOza,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK4hB,uBAAuBxb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6W,EAAaxV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWyQ,GACd,IACI,MAAMvU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmY,EAAQ3a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK6hB,wBAAwBzb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6W,EAAaxV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIwU,OAAAA,GACI,IACI,MAAMzU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,qBAAqB1b,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,IAAIyF,EAAK3T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B+T,CACnB,CAAU,QACE/a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+hB,sBAAsB3b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyY,GAAuD,oBAAzBzd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKiiB,mBAAmBzgB,IAAQ,K,OAGtE,MAAM0gB,EAEF,aAAO7Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2Z,EAAQ1Z,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBwgB,GAAoBxd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkb,GAAoBvd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKiiB,mBAAmBzgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK4Q,uBAAuBhI,EAAY9B,WACpD,OAAOob,EAAQ7Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKmiB,oBAAoB1b,EAAMG,GAC3C,OAAOsb,EAAQ7Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoiB,kBAAkBhc,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,UAAAA,GACI,MAAMjQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOiK,EAAQ1I,OAAOzH,EAC9B,CASI2a,OAAAA,CAAQ9J,GACJ,IAAI4Q,EACAC,EACJ,IACI,MAAMlc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiP,EAAYzR,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKuiB,gBAAgBnc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GACpCsW,EAAKvZ,IAAkBiD,EAAS,EAAI,GACpCuO,EAAO5N,EACP6N,EAAO5N,EACX,GAAI0V,EAEA,MADA/H,EAAO,EAAGC,EAAO,EACXjU,EAAW2U,GAIrB,OAFA+M,EAAc1N,EACd2N,EAAc1N,EACPrT,EAAmBoT,EAAMC,EAC5C,CAAU,QACE5U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB4Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,EAAWxjB,EAAQqV,GAC9B,GAAwB,mBAAboO,UAA2BzjB,aAAkByjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB3jB,EAAQqV,EAEtE,CAAc,MAAOzM,GACL,GAA0C,oBAAtC5I,EAAO4jB,QAAQje,IAAI,gBAInB,MAAMiD,EAHNib,QAAQC,KAAK,oMAAqMlb,EAKtO,CAGQ,MAAM4S,QAAcxb,EAAO+jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOnG,EAEpD,CAAW,CACH,MAAM1O,QAAiB+c,YAAYM,YAAYhkB,EAAQqV,GAEvD,OAAI1O,aAAoB+c,YAAYO,SACzB,CAAEtd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASud,IACL,MAAM7O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ8O,IAAIC,2BAA6B,SAASpe,GAC9CtE,EAAWsE,EACnB,EACIqP,EAAQ8O,IAAIE,2BAA6B,WAAa,OAAO5b,GAAY,WAErE,OAAO/F,EADK,IAAI4hB,eAExB,GAAOC,UAAU,EACblP,EAAQ8O,IAAIK,wCAA0C,WAAa,OAAO/b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMye,iBAAiBniB,EAAmB2D,EAAMO,GAClE,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIO,4BAA8B,WAAa,OAAOjc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM4b,EAAMC,GAC9GxjB,EAAU4E,GAAM6e,KAAKviB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM4b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACblP,EAAQ8O,IAAIW,4BAA8B,WAAa,OAAOrc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM+e,MACxB,GAAOR,UAAU,EACblP,EAAQ8O,IAAIa,gCAAkC,WAAa,OAAOvc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMif,SAEpC,GAAOV,UAAU,EACblP,EAAQ8O,IAAIe,8BAAgC,WAAa,OAAOzc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMmf,MAEpC,GAAOZ,UAAU,EACblP,EAAQ8O,IAAIiB,2BAA6B,WAErC,OAAO1iB,EADK,IAAI2G,OAExB,EACIgM,EAAQ8O,IAAIkB,sBAAwB,SAASrf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIoP,EAAQ8O,IAAImB,2BAA6B,WAAa,OAAO7c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY+e,QAAQniB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIqB,2BAA6B,WAAa,OAAO/c,GAAY,WAErE,OAAO/F,EADK,IAAI+iB,QAExB,GAAOlB,UAAU,EACblP,EAAQ8O,IAAIuB,4BAA8B,SAAS1f,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIqP,EAAQ8O,IAAIwB,2BAA6B,WAAa,OAAOld,GAAY,WAErE,OAAO/F,EADK,IAAIkjB,gBAExB,GAAOrB,UAAU,EACblP,EAAQ8O,IAAI0B,8BAAgC,SAAS7f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM8f,OAEpC,EACIzQ,EAAQ8O,IAAI4B,8BAAgC,WAAa,OAAOtd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM4b,GAC1GvjB,EAAU4E,GAAMggB,OAAO1jB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM4b,GACxF,GAAOJ,UAAU,EACblP,EAAQ8O,IAAI8B,2CAA6C,SAASjgB,GAC9D,IAAIkgB,EACJ,IACIA,EAAS9kB,EAAU4E,aAAiByd,QAChD,CAAU,MAAOve,GACLghB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI7Q,EAAQ8O,IAAIgC,8BAAgC,SAASngB,GAEjD,OADY5E,EAAU4E,GAAMmf,MAEpC,EACI9P,EAAQ8O,IAAIiC,2BAA6B,SAASpgB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIkC,+BAAiC,SAASrgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM4d,QAEpC,EACIvO,EAAQ8O,IAAImC,gCAAkC,WAE1C,OAAO5jB,EADK6jB,OAAOC,SAE3B,EACInR,EAAQ8O,IAAIsC,2BAA6B,WAAa,OAAOhe,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK6iB,QAAQ5f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOse,UAAU,EACblP,EAAQ8O,IAAIuC,uBAAyB,SAAS1gB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIqP,EAAQ8O,IAAIwC,4BAA8B,WAAa,OAAOle,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIyC,qBAAuB,SAAS5gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIgR,EAAQ8O,IAAI0C,4BAA8B,SAAS7gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM8gB,KAEpC,EACIzR,EAAQ8O,IAAI4C,4BAA8B,WAAa,OAAOte,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM8gB,OAEpC,GAAOvC,UAAU,EACblP,EAAQ8O,IAAI6C,4BAA8B,SAAShhB,GAE/C,OADY5E,EAAU4E,GAAMihB,IAEpC,EACI5R,EAAQ8O,IAAI+C,6BAA+B,SAASlhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMmhB,MAEpC,EACI9R,EAAQ8O,IAAIiD,6BAA+B,SAASphB,GAChD5E,EAAU4E,GAAMqhB,OACxB,EACIhS,EAAQ8O,IAAImD,iCAAmC,WAAa,OAAO7e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOue,UAAU,EACblP,EAAQ8O,IAAIoD,sBAAwB,SAASvhB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIqD,2BAA6B,SAASxhB,EAAMC,GACpD4d,QAAQ4D,IAAInlB,EAAmB0D,EAAMC,GAC7C,EACIoP,EAAQ8O,IAAIuD,2BAA6B,SAAS1hB,GAE9C,OAAOtD,EADK4T,OAAOC,QAAQ,GAAIvQ,GAEvC,EACIqP,EAAQ8O,IAAIwD,4BAA8B,WAAa,OAAOlf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIyD,kBAAoB,SAAS5hB,GAErC,OAAOtD,EADKkJ,GAAQxC,OAAOpD,GAEnC,EACIqP,EAAQ8O,IAAI0D,kBAAoB,WAE5B,OAAOnlB,EADKolB,EAAWC,uBAE/B,EACI1S,EAAQ8O,IAAI6D,kBAAoB,WAE5B,OAAOtlB,EADK3B,EAAKd,OAEzB,EACIoV,EAAQ8O,IAAI8D,mCAAqC,SAASjiB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIsM,EAAQ8O,IAAI+D,4BAA8B,SAASliB,GAE/C,OAAOtD,EADKylB,EAAkB/e,OAAOpD,GAE7C,EACIqP,EAAQ8O,IAAIiE,sBAAwB,SAASpiB,GAEzC,OAAOtD,EADK2lB,GAAYjf,OAAOpD,GAEvC,EACIqP,EAAQ8O,IAAImE,qCAAuC,SAAStiB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIqP,EAAQ8O,IAAIoE,2BAA6B,SAASviB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI6O,EAAQ8O,IAAIqE,mBAAqB,SAASxiB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACIwP,EAAQ8O,IAAIsE,2BAA6B,WAErC,OAAO/lB,EADK,IAAIzB,MAExB,EACIoU,EAAQ8O,IAAIuE,4BAA8B,SAAS1iB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIoP,EAAQ8O,IAAIwE,mCAAqC,WAAa,OAAOlgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM+d,cAEpC,GAAOQ,UAAU,EACblP,EAAQ8O,IAAIyE,2BAA6B,SAAS5iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIqP,EAAQ8O,IAAI0E,8BAAgC,SAAS7iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI6T,EAAQ8O,IAAI2E,2BAA6B,SAAS9iB,EAAMC,GACpD,IACI,IAAI8iB,EAAS,CAACljB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN6oB,CAAChjB,EAAMC,KACb,MAAMJ,EAAIkjB,EAAOljB,EACjBkjB,EAAOljB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGkjB,EAAOjjB,EAAGE,EAAMC,EAChE,CAAkB,QACE8iB,EAAOljB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEonB,EAAOljB,EAAIkjB,EAAOjjB,EAAI,CAClC,CACA,EACIuP,EAAQ8O,IAAI8E,sBAAwB,SAASjjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIqP,EAAQ8O,IAAI+E,2BAA6B,WAErC,OAAOxmB,EADK,IAAIT,MAExB,EACIoT,EAAQ8O,IAAIgF,6BAA+B,SAASnjB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIiF,6BAA+B,SAASpjB,EAAMC,GACtD,IAAIojB,EACAC,EACJ,IACID,EAAcrjB,EACdsjB,EAAcrjB,EACd4d,QAAQ0F,MAAMjnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB6e,EAAaC,EAAa,EAC3D,CACA,EACIjU,EAAQ8O,IAAIqF,8BAAgC,SAASxjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACIiT,EAAQ8O,IAAIsF,kDAAoD,SAASzjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI6O,EAAQ8O,IAAIuF,sCAAwC,WAAa,OAAOjhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM2jB,eAAejoB,EAAWuE,GAClD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIyF,gCAAkC,SAAS5jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI6O,EAAQ8O,IAAI0F,uCAAyC,WAAa,OAAOphB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM8jB,gBAAgB1oB,EAAU6E,GAClD,GAAOse,UAAU,EACblP,EAAQ8O,IAAI4F,2BAA6B,SAAS/jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI6O,EAAQ8O,IAAI6F,8BAAgC,SAAShkB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMikB,OAEpC,EACI5U,EAAQ8O,IAAI+F,+BAAiC,SAASlkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMmkB,QAEpC,EACI9U,EAAQ8O,IAAIiG,gCAAkC,SAASpkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMqkB,SAEpC,EACIhV,EAAQ8O,IAAImG,4BAA8B,SAAStkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMukB,KAEpC,EACIlV,EAAQ8O,IAAIqG,qBAAuB,SAASxkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIqP,EAAQ8O,IAAIsG,+BAAiC,WAAa,OAAOhiB,GAAY,WAEzE,OAAO/F,EADK1C,OAAO0qB,QAE3B,GAAOnG,UAAU,EACblP,EAAQ8O,IAAIwG,gCAAkC,SAAS3kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM4kB,SAEpC,EACIvV,EAAQ8O,IAAI0G,qCAAuC,SAAS7kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIqP,EAAQ8O,IAAI2G,8BAAgC,SAAS9kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI6T,EAAQ8O,IAAI4G,2BAA6B,SAAS/kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIoP,EAAQ8O,IAAI6G,4BAA8B,WAAa,OAAOviB,GAAY,WAEtE,OAAO/F,EADKuoB,KAAKA,KAEzB,GAAO1G,UAAU,EACblP,EAAQ8O,IAAI+G,8BAAgC,WAAa,OAAOziB,GAAY,WAExE,OAAO/F,EADKyoB,OAAOA,OAE3B,GAAO5G,UAAU,EACblP,EAAQ8O,IAAIiH,kCAAoC,WAAa,OAAO3iB,GAAY,WAE5E,OAAO/F,EADK2oB,WAAWA,WAE/B,GAAO9G,UAAU,EACblP,EAAQ8O,IAAImH,8BAAgC,WAAa,OAAO7iB,GAAY,WAExE,OAAO/F,EADK6oB,OAAOA,OAE3B,GAAOhH,UAAU,EACblP,EAAQ8O,IAAIqH,wBAA0B,SAASxlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIqP,EAAQ8O,IAAIsH,iCAAmC,SAASzlB,EAAMC,GAE1D,OAAOvD,EADK,IAAIgpB,SAASppB,EAAmB0D,EAAMC,IAE1D,EACIoP,EAAQ8O,IAAIwH,2BAA6B,WAAa,OAAOljB,GAAY,SAAUzC,EAAMC,GAErF,OADYsf,QAAQqG,IAAIxqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOse,UAAU,EACblP,EAAQ8O,IAAI0H,6BAA+B,SAAS7lB,GAEhD,OAAOtD,EADKopB,MAAM1qB,EAAU4E,IAEpC,EACIqP,EAAQ8O,IAAI4H,6BAA+B,SAAS/lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM8lB,MAAM1qB,EAAU6E,IAEpD,EACIoP,EAAQ8O,IAAI6H,wBAA0B,SAAShmB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAI8H,iBAAmB,SAASjmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIoP,EAAQ8O,IAAI+H,mBAAqB,SAASlmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIqP,EAAQ8O,IAAIgI,4BAA8B,SAASnmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMomB,KAAKhrB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI6O,EAAQ8O,IAAIkI,4BAA8B,SAASrmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMomB,KAAKhrB,EAAU6E,IAEnD,EACIoP,EAAQ8O,IAAImI,sCAAwC,SAAStmB,GACzDumB,eAAenrB,EAAU4E,GACjC,EACIqP,EAAQ8O,IAAIqI,sCAAwC,SAASxmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMumB,eAEpC,EACIlX,EAAQ8O,IAAIsI,+BAAiC,SAASzmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIqP,EAAQ8O,IAAIuI,iCAAmC,WAE3C,OAAOhqB,EADKiqB,QAAQC,UAE5B,EACIvX,EAAQ8O,IAAI0I,2BAA6B,SAAS7mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIqP,EAAQ8O,IAAI2I,iCAAmC,SAAS9mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKiqB,QAAQC,UAAUxrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI6O,EAAQ8O,IAAI4I,6BAA+B,SAAS/mB,GAEhD,OADY5E,EAAU4E,GAAMud,KAEpC,EACIlO,EAAQ8O,IAAI6I,6BAA+B,SAAShnB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMmhB,MAEpC,EACI9R,EAAQ8O,IAAI8I,iCAAmC,SAASjnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC2pB,mBAAoB,6OAO7BnsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIgJ,2BAA6B,WAAa,OAAO1kB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIiJ,oCAAsC,SAASpnB,EAAMC,GAC7D7E,EAAU4E,GAAMqnB,UAAYjsB,EAAU6E,EAC9C,EACIoP,EAAQ8O,IAAImJ,0BAA4B,SAAStnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMssB,GAAGnsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI6O,EAAQ8O,IAAIqJ,mCAAqC,WAAa,OAAO/kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOse,UAAU,EACblP,EAAQ8O,IAAIsJ,4BAA8B,SAASznB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM0nB,KAEpC,EACIrY,EAAQ8O,IAAIwJ,yCAA2C,WAAa,OAAOllB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIkrB,QAAQtrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO+d,UAAU,EACblP,EAAQ8O,IAAI0J,oCAAsC,WAAa,OAAOplB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM6nB,aAC5B,IAAI9gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOuX,UAAU,EACblP,EAAQ8O,IAAI4J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACI8O,EAAQ8O,IAAI6J,+BAAiC,SAAShoB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEW8O,CACX,CAEA,SAAS4Y,EAAkB5Y,EAAS6Y,GAChC7Y,EAAQ8O,IAAIlkB,OAASiuB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoB5nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS6nB,QAChB1G,EAAWC,uBAAyB/nB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAK0tB,mBACE1tB,CACX,CAEA,SAAS2tB,EAAS1uB,EAAQkuB,GACtB,QAAa/sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMsU,EAAU6O,IAEhB+J,EAAkB5Y,EAAS6Y,GAErBluB,aAAkB0jB,YAAYiL,SAChC3uB,EAAS,IAAI0jB,YAAYiL,OAAO3uB,IAKpC,OAAOuuB,EAFU,IAAI7K,YAAYO,SAASjkB,EAAQqV,GAEbrV,EACzC,CAEAujB,eAAeuE,EAAW8G,EAAOV,GAC7B,QAAa/sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMsU,EAAU6O,KAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,EAAkB5Y,EAAS6Y,GAE3B,MAAM,SAAEvnB,EAAQ,OAAE3G,SAAiBwjB,QAAiBoL,EAAOvZ,GAE3D,OAAOkZ,EAAoB5nB,EAAU3G,EACzC,CAEA,IAAIwuB,EAAuBnlB,OAAOylB,OAAO,CACrCC,UAAW,KACX5lB,QAAS2I,EACT/G,UAAW1D,EACXgE,kBAAmB8c,EACnB3b,MAAOsQ,EACPlR,QAASA,GACT4B,SAAUwhB,GACV1e,aAAcyF,GACd5E,WAAYvH,GACZgJ,qBAAsBR,GACtBgB,QAAS7L,GACT0nB,eAAgBC,GAChB9V,WAAYrN,GACZmQ,iBAAkBiT,GAClBvS,gBAAiBnH,GACjBmI,UAAWjT,GACXuT,YAAamK,GACbzJ,aAActX,GACd2b,QAASjZ,GACTolB,QAAStH,EACT4G,SAAUA,EACVlmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMuoB,GAAY,wBCp6Ib,MACD7mB,eAAgB8mB,GAAkB,QAClCnmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACR8C,GAAY,QACZif,GAAO,WACPpe,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACPgG,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZhX,SDm5IoB2b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY9qB,KAAKgrB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAe7H,EAAY8H,SAG3B9H,EAAW8H,GAGdpB,CAAO,ECt6IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,eAIvBtL,eAAe/a,EAAesnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIT,IAAI,aAA+BiB,EACpE,C","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_279(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {string | undefined} caller\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, caller, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(caller) ? 0 : passStringToWasm0(caller, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr3 = amount_record.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr4 = fee_record.__destroy_into_raw();\n }\n var ptr5 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len5 = WASM_VECTOR_LEN;\n let ptr6 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr6 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr7 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr8 = fee_proving_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr9 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr10 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr10 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, fee_credits, ptr4, ptr5, len5, ptr6, ptr7, ptr8, ptr9, ptr10);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_279(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5763 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5788 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_279","arg3","wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","caller","transfer_proving_key","transfer_verifying_key","len5","ptr9","ptr10","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","log","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_transaction_new","Transaction$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5763","__wbindgen_closure_wrapper5788","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info"],"sourceRoot":""} \ No newline at end of file diff --git a/52.bundle.js b/52.bundle.js index 27f4d9607..852a3716f 100644 --- a/52.bundle.js +++ b/52.bundle.js @@ -1,3 +1,3 @@ /*! For license information please see 52.bundle.js.LICENSE.txt */ -(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[52,933],{2583:(e,t,r)=>{e.exports=r.p+"3ebf0bb8781b6d786343.js"},5934:(e,t,r)=>{e.exports=r.p+"8cbe7e9b06e560a22f36.wasm"},5052:(e,t,r)=>{r.a(e,(async(e,n)=>{try{r.r(t),r.d(t,{Account:()=>f,Address:()=>i.kL,AleoKeyProvider:()=>p,AleoKeyProviderParams:()=>b,AleoNetworkClient:()=>w,BlockHeightSearch:()=>m,CREDITS_PROGRAM_KEYS:()=>T,ExecutionResponse:()=>i._U,Field:()=>i.gN,FunctionExecution:()=>i.o,KEY_STORE:()=>S,NetworkRecordProvider:()=>v,OfflineKeyProvider:()=>h,OfflineQuery:()=>i.Gd,OfflineSearchParams:()=>y,PRIVATE_TO_PUBLIC_TRANSFER:()=>F,PRIVATE_TRANSFER:()=>R,PRIVATE_TRANSFER_TYPES:()=>E,PUBLIC_TO_PRIVATE_TRANSFER:()=>A,PUBLIC_TRANSFER:()=>x,PUBLIC_TRANSFER_AS_SIGNER:()=>C,PrivateKey:()=>i._q,PrivateKeyCiphertext:()=>i.uq,Program:()=>i.$r,ProgramManager:()=>K,ProgramManagerBase:()=>i.L,ProvingKey:()=>i.zW,RecordCiphertext:()=>i.fW,RecordPlaintext:()=>i.PD,Signature:()=>i.Pc,Transaction:()=>i.YW,VALID_TRANSFER_TYPES:()=>V,VerifyingKey:()=>i.XV,ViewKey:()=>i.IO,createAleoWorker:()=>k,initThreadPool:()=>i.CK,initializeWasm:()=>u,logAndThrow:()=>l,verifyFunctionExecution:()=>i.hz});var i=r(9933),_=r(6891),a=e([i]);i=(a.then?(await a)():a)[0];class f{_privateKey;_viewKey;_address;constructor(e={}){try{this._privateKey=this.privateKeyFromParams(e)}catch(e){throw console.error("Wrong parameter",e),new Error("Wrong Parameter")}this._viewKey=i.IO.from_private_key(this._privateKey),this._address=i.kL.from_private_key(this._privateKey)}static fromCiphertext(e,t){try{e="string"==typeof e?i.uq.fromString(e):e;const r=i._q.fromPrivateKeyCiphertext(e,t);return new f({privateKey:r.to_string()})}catch(e){throw new Error("Wrong password or invalid ciphertext")}}privateKeyFromParams(e){return e.seed?i._q.from_seed_unchecked(e.seed):e.privateKey?i._q.from_string(e.privateKey):new i._q}privateKey(){return this._privateKey}viewKey(){return this._viewKey}address(){return this._address}toString(){return this.address().to_string()}encryptAccount(e){return this._privateKey.toCiphertext(e)}decryptRecord(e){return this._viewKey.decrypt(e)}decryptRecords(e){return e.map((e=>this._viewKey.decrypt(e)))}ownsRecordCiphertext(e){if("string"!=typeof e)return e.isOwner(this._viewKey);try{return i.fW.fromString(e).isOwner(this._viewKey)}catch(e){return!1}}sign(e){return this._privateKey.sign(e)}verify(e,t){return this._address.verify(e,t)}}async function o(e,t){const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not get URL "+e);return r}async function s(e,t){t.method="POST";const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not post URL "+e);return r}class w{host;headers;account;constructor(e,t){this.host=e+"/testnet",t&&t.headers?this.headers=t.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const t=await o(this.host+e,{headers:this.headers});return await t.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,t,r,n,_,a){if(a=a||[],e<0)throw new Error("Start height must be greater than or equal to 0");const o=new Array;let s,c,d,g,l=0,u=BigInt(0);if(void 0===r){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");d=this.account._privateKey}else try{d=r instanceof i._q?r:i._q.from_string(r)}catch(e){throw new Error("Error parsing private key provided.")}const f=d.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");g=e}catch(e){throw new Error("Error fetching latest block height.")}if(c="number"==typeof t&&t<=g?t:g,e>c)throw new Error("Start height must be less than or equal to end height.");for(;c>e;){s=c-50,s=BigInt(_))))return o;if(void 0!==n&&n.length>0){let e=0;if(t.microcredits()>n[e]){if(e+=1,o.push(t),"number"==typeof _&&(u+=t.microcredits(),u>=BigInt(_)))return o;if(o.length>=n.length)return o}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+s.toString()+"-"+c.toString()),console.warn("Error: ",e),l+=1,l>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),o}}return o}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,t){try{return await this.fetchData("/blocks?start="+e+"&end="+t)}catch(r){throw new Error("Error fetching blocks between "+e+" and "+t+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof i.$r&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const t=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(t)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return i.$r.fromString(e)}catch(t){try{return i.$r.fromString(await this.getProgram(e))}catch(t){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const t={},r=(e instanceof i.$r?e:await this.getProgramObject(e)).getImports();for(let e=0;e{if(void 0===e)r(new Error("No search parameters provided, cannot retrieve keys"));else{const n=e.cacheKey,_=e.verifyCreditsKeys;if(this.cache.has(n)){const[e,a]=this.cache.get(n),o=i.zW.fromBytes(e),s=i.XV.fromBytes(a);if(_){this.verifyCreditsKeys(n,o,s)||r(new Error(`Cached keys do not match expected keys for ${n}`))}t([o,s])}else r(new Error("Keys not found in cache for "+n))}}))}verifyCreditsKeys(e,t,r){switch(e){case T.bond_public.locator:return t.isBondPublicProver()&&r.isBondPublicVerifier();case T.claim_unbond_public.locator:return t.isClaimUnbondPublicProver()&&r.isClaimUnbondPublicVerifier();case T.fee_private.locator:return t.isFeePrivateProver()&&r.isFeePrivateVerifier();case T.fee_public.locator:return t.isFeePublicProver()&&r.isFeePublicVerifier();case T.inclusion.locator:return t.isInclusionProver()&&r.isInclusionVerifier();case T.join.locator:return t.isJoinProver()&&r.isJoinVerifier();case T.set_validator_state.locator:return t.isSetValidatorStateProver()&&r.isSetValidatorStateVerifier();case T.split.locator:return t.isSplitProver()&&r.isSplitVerifier();case T.transfer_private.locator:return t.isTransferPrivateProver()&&r.isTransferPrivateVerifier();case T.transfer_private_to_public.locator:return t.isTransferPrivateToPublicProver()&&r.isTransferPrivateToPublicVerifier();case T.transfer_public.locator:return t.isTransferPublicProver()&&r.isTransferPublicVerifier();case T.transfer_public_to_private.locator:return t.isTransferPublicToPrivateProver()&&r.isTransferPublicToPrivateVerifier();case T.unbond_public.locator:return t.isUnbondPublicProver()&&r.isUnbondPublicVerifier();default:return!1}}feePrivateKeys(){return this.functionKeys(y.feePrivateKeyParams())}feePublicKeys(){return this.functionKeys(y.feePublicKeyParams())}joinKeys(){return this.functionKeys(y.joinKeyParams())}splitKeys(){return this.functionKeys(y.splitKeyParams())}transferKeys(e){if(R.has(e))return this.functionKeys(y.transferPrivateKeyParams());if(F.has(e))return this.functionKeys(y.transferPrivateToPublicKeyParams());if(x.has(e))return this.functionKeys(y.transferPublicKeyParams());if(C.has(e))return this.functionKeys(y.transferPublicAsSignerKeyParams());if(A.has(e))return this.functionKeys(y.transferPublicToPrivateKeyParams());throw new Error("Invalid visibility type")}async unBondPublicKeys(){return this.functionKeys(y.unbondPublicKeyParams())}insertBondPublicKeys(e){if(!e.isBondPublicProver())throw new Error("Attempted to insert invalid proving keys for bond_public");this.cache.set(T.bond_public.locator,[e.toBytes(),i.XV.bondPublicVerifier().toBytes()])}insertClaimUnbondPublicKeys(e){if(!e.isClaimUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for claim_unbond_public");this.cache.set(T.claim_unbond_public.locator,[e.toBytes(),i.XV.claimUnbondPublicVerifier().toBytes()])}insertFeePrivateKeys(e){if(!e.isFeePrivateProver())throw new Error("Attempted to insert invalid proving keys for fee_private");this.cache.set(T.fee_private.locator,[e.toBytes(),i.XV.feePrivateVerifier().toBytes()])}insertFeePublicKeys(e){if(!e.isFeePublicProver())throw new Error("Attempted to insert invalid proving keys for fee_public");this.cache.set(T.fee_public.locator,[e.toBytes(),i.XV.feePublicVerifier().toBytes()])}insertJoinKeys(e){if(!e.isJoinProver())throw new Error("Attempted to insert invalid proving keys for join");this.cache.set(T.join.locator,[e.toBytes(),i.XV.joinVerifier().toBytes()])}insertSetValidatorStateKeys(e){if(!e.isSetValidatorStateProver())throw new Error("Attempted to insert invalid proving keys for set_validator_state");this.cache.set(T.set_validator_state.locator,[e.toBytes(),i.XV.setValidatorStateVerifier().toBytes()])}insertSplitKeys(e){if(!e.isSplitProver())throw new Error("Attempted to insert invalid proving keys for split");this.cache.set(T.split.locator,[e.toBytes(),i.XV.splitVerifier().toBytes()])}insertTransferPrivateKeys(e){if(!e.isTransferPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_private");this.cache.set(T.transfer_private.locator,[e.toBytes(),i.XV.transferPrivateVerifier().toBytes()])}insertTransferPrivateToPublicKeys(e){if(!e.isTransferPrivateToPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_private_to_public");this.cache.set(T.transfer_private_to_public.locator,[e.toBytes(),i.XV.transferPrivateToPublicVerifier().toBytes()])}insertTransferPublicKeys(e){if(!e.isTransferPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_public");this.cache.set(T.transfer_public.locator,[e.toBytes(),i.XV.transferPublicVerifier().toBytes()])}insertTransferPublicToPrivateKeys(e){if(!e.isTransferPublicToPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_public_to_private");this.cache.set(T.transfer_public_to_private.locator,[e.toBytes(),i.XV.transferPublicToPrivateVerifier().toBytes()])}insertUnbondPublicKeys(e){if(!e.isUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for unbond_public");this.cache.set(T.unbond_public.locator,[e.toBytes(),i.XV.unbondPublicVerifier().toBytes()])}}class v{account;networkClient;constructor(e,t){this.account=e,this.networkClient=t}setAccount(e){this.account=e}async findCreditsRecords(e,t,r,n){let i=0,_=0;if(n&&("startHeight"in n&&"number"==typeof n.endHeight&&(i=n.startHeight),"endHeight"in n&&"number"==typeof n.endHeight&&(_=n.endHeight)),0==_){const e=await this.networkClient.getLatestHeight();if(e instanceof Error)throw l("Unable to get current block height from the network");_=e}if(i>=_)throw l("Start height must be less than end height");return await this.networkClient.findUnspentRecords(i,_,this.account.privateKey(),e,void 0,r)}async findCreditsRecord(e,t,r,n){const i=await this.findCreditsRecords([e],t,r,n);return!(i instanceof Error)&&i.length>0?i[0]:(console.error("Record not found with error:",i),new Error("Record not found"))}async findRecord(e,t,r){throw new Error("Method not implemented.")}async findRecords(e,t,r){throw new Error("Method not implemented.")}}class m{startHeight;endHeight;constructor(e,t){this.startHeight=e,this.endHeight=t}}let P=null;const k=()=>{if(!P){const e=new Worker(new URL(r.p+r.u(530),r.b),{type:void 0});P=(0,_.Ud)(e)}return P};class K{account;keyProvider;host;networkClient;recordProvider;constructor(e,t,r){this.host=e||"https://api.explorer.aleo.org/v1",this.networkClient=new w(this.host),this.keyProvider=t||new p,this.recordProvider=r}setAccount(e){this.account=e}setKeyProvider(e){this.keyProvider=e}setHost(e){this.host=e,this.networkClient.setHost(e)}setRecordProvider(e){this.recordProvider=e}async deploy(e,t,r,n,_,a){try{const t=i.$r.fromString(e);let r;try{r=await this.networkClient.getProgram(t.id())}catch(e){console.log(`Program ${t.id()} does not exist on the network, deploying...`)}if("string"==typeof r)throw`Program ${t.id()} already exists on the network, please rename your program`}catch(e){throw l(`Error validating program: ${e}`)}let o,s=a;if(void 0===a&&void 0!==this.account&&(s=this.account.privateKey()),void 0===s)throw"No private key provided and no private key set in the ProgramManager";try{_=r?await this.getCreditsRecord(t,[],_,n):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{o=r?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[c,d]=o;let g;try{g=await this.networkClient.getProgramImports(e)}catch(e){throw l(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}const u=await i.L.buildDeploymentTransaction(s,e,t,_,this.host,g,c,d);return await this.networkClient.submitTransaction(u)}async buildExecutionTransaction(e){const{programName:t,functionName:r,fee:n,privateFee:_,inputs:a,recordSearchParams:o,keySearchParams:s,privateKey:c,offlineQuery:d}=e;let g=e.feeRecord,u=e.provingKey,f=e.verifyingKey,w=e.program,b=e.imports;if(void 0===w)try{w=await this.networkClient.getProgram(t)}catch(e){throw l(`Error finding ${t}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`)}else w instanceof i.$r&&(w=w.toString());let p,y=c;if(void 0===c&&void 0!==this.account&&(y=this.account.privateKey()),void 0===y)throw"No private key provided and no private key set in the ProgramManager";try{g=_?await this.getCreditsRecord(n,[],g,o):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{p=_?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[h,v]=p;if(!u||!f)try{[u,f]=await this.keyProvider.functionKeys(s)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}if(i.$r.fromString(w).getImports().length>0&&!b)try{b=await this.networkClient.getProgramImports(t)}catch(e){throw l(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await i.L.buildExecutionTransaction(y,w,r,a,n,g,this.host,b,u,f,h,v,d)}async execute(e){const t=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(t)}async run(e,t,r,n,_,a,o,s,c,d){let g=c;if(void 0===c&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";if(!o||!s)try{[o,s]=await this.keyProvider.functionKeys(a)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",o),console.log("Verifying key: ",s),i.L.executeFunctionOffline(g,e,t,r,n,!1,_,o,s,this.host,d)}async join(e,t,r,n,_,a,o,s){let c,d,g=o;if(void 0===o&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";try{c=n?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),d=await this.keyProvider.joinKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[u,f]=c,[w,b]=d;try{a=n?await this.getCreditsRecord(r,[],a,_):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof i.PD?e:i.PD.fromString(e),t=t instanceof i.PD?t:i.PD.fromString(t)}catch(e){throw l("Records provided are not valid. Please ensure they are valid plaintext records.")}const p=await i.L.buildJoinTransaction(g,e,t,r,a,this.host,w,b,u,f,s);return await this.networkClient.submitTransaction(p)}async split(e,t,r,n){let _,a=r;if(void 0===a&&void 0!==this.account&&(a=this.account.privateKey()),void 0===a)throw"No private key provided and no private key set in the ProgramManager";try{_=await this.keyProvider.splitKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[o,s]=_;try{t=t instanceof i.PD?t:i.PD.fromString(t)}catch(e){throw l("Record provided is not valid. Please ensure it is a valid plaintext record.")}const c=await i.L.buildSplitTransaction(a,e,t,this.host,o,s,n);return await this.networkClient.submitTransaction(c)}async synthesizeKeys(e,t,r,n){let _,a=n;void 0===a&&(a=void 0!==this.account?this.account.privateKey():new i._q);try{_=await this.networkClient.getProgramImports(e);const n=await i.L.synthesizeKeyPair(a,e,t,r,_);return[n.provingKey(),n.verifyingKey()]}catch(e){throw l(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,t,r,n,_,a,o,s,g,u){r=d(r);let f,w,b=g;if(void 0===b&&void 0!==this.account&&(b=this.account.privateKey()),void 0===b)throw"No private key provided and no private key set in the ProgramManager";try{f=_?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),w=await this.keyProvider.transferKeys(r)}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[p,y]=f,[h,v]=w;try{const e=[];c(r)?(o=await this.getCreditsRecord(n,[],o,a),e.push(o.nonce())):o=void 0,s=_?await this.getCreditsRecord(n,e,s,a):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await i.L.buildTransferTransaction(b,e,t,r,o,n,s,this.host,h,v,p,y,u)}async buildTransferPublicTransaction(e,t,r,n,i){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,i)}async buildTransferPublicAsSignerTransaction(e,t,r,n,i){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,i)}async transfer(e,t,r,n,i,_,a,o,s,c){const d=await this.buildTransferTransaction(e,t,r,n,i,_,a,o,s,c);return await this.networkClient.submitTransaction(d)}async buildBondPublicTransaction(e,t,r,n,i={}){const _=Math.trunc(1e6*n),{programName:a="credits.aleo",functionName:o="bond_public",fee:s=i.fee||.86,privateFee:c=!1,inputs:d=[e,t,r,`${_.toString()}u64`],keySearchParams:g=new b({proverUri:T.bond_public.prover,verifierUri:T.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:l=this.creditsProgram(),...u}=i,f={programName:a,functionName:o,fee:s,privateFee:c,inputs:d,keySearchParams:g,...u};return await this.buildExecutionTransaction(f)}async bondPublic(e,t,r,n,i={}){const _=await this.buildBondPublicTransaction(e,t,r,n,i);return await this.networkClient.submitTransaction(_)}async buildBondValidatorTransaction(e,t,r,n,i={}){const _=Math.trunc(1e6*r),a=Math.trunc(n),{programName:o="credits.aleo",functionName:s="bond_validator",fee:c=i.fee||.86,privateFee:d=!1,inputs:g=[e,t,`${_.toString()}u64`,`${a.toString()}u8`],keySearchParams:l=new b({proverUri:T.bond_validator.prover,verifierUri:T.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:u=this.creditsProgram(),...f}=i,w={programName:o,functionName:s,fee:c,privateFee:d,inputs:g,keySearchParams:l,...f};return await this.buildExecutionTransaction(w)}async bondValidator(e,t,r,n,i={}){const _=await this.buildBondValidatorTransaction(e,t,r,n,i);return await this.networkClient.submitTransaction(_)}async buildUnbondPublicTransaction(e,t,r={}){const n=Math.trunc(1e6*t),{programName:i="credits.aleo",functionName:_="unbond_public",fee:a=r.fee||1.3,privateFee:o=!1,inputs:s=[e,`${n.toString()}u64`],keySearchParams:c=new b({proverUri:T.unbond_public.prover,verifierUri:T.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:d=this.creditsProgram(),...g}=r,l={programName:i,functionName:_,fee:a,privateFee:o,inputs:s,keySearchParams:c,...g};return this.buildExecutionTransaction(l)}async unbondPublic(e,t,r={}){const n=await this.buildUnbondPublicTransaction(e,t,r);return await this.networkClient.submitTransaction(n)}async buildClaimUnbondPublicTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="claim_unbond_public",fee:i=t.fee||2,privateFee:_=!1,inputs:a=[e],keySearchParams:o=new b({proverUri:T.claim_unbond_public.prover,verifierUri:T.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:s=this.creditsProgram(),...c}=t,d={programName:r,functionName:n,fee:i,privateFee:_,inputs:a,keySearchParams:o,...c};return await this.buildExecutionTransaction(d)}async claimUnbondPublic(e,t={}){const r=await this.buildClaimUnbondPublicTransaction(e,t);return await this.networkClient.submitTransaction(r)}async buildSetValidatorStateTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="set_validator_state",fee:i=1,privateFee:_=!1,inputs:a=[e.toString()],keySearchParams:o=new b({proverUri:T.set_validator_state.prover,verifierUri:T.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...s}=t,c={programName:r,functionName:n,fee:i,privateFee:_,inputs:a,keySearchParams:o,...s};return await this.execute(c)}async setValidatorState(e,t={}){const r=await this.buildSetValidatorStateTransaction(e,t);return this.networkClient.submitTransaction(r)}verifyExecution(e){try{const t=e.getExecution(),r=e.getFunctionId(),n=e.getProgram(),_=e.getVerifyingKey();return(0,i.hz)(t,_,n,r)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return i.$r.fromString(e)}creditsProgram(){return i.$r.getCreditsProgram()}verifyProgram(e){try{return i.$r.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,t,r,n){try{return r instanceof i.PD?r:i.PD.fromString(r)}catch(r){try{const r=this.recordProvider;return await r.findCreditsRecord(e,!0,t,n)}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function c(e){return E.has(e)}function d(e){return V.has(e)?e:l(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const S=i.SF.baseUrl();function g(e){const t=i.XV[e.verifyingKey];if(!t)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:t}}const T={bond_public:g(i.SF.bond_public()),bond_validator:g(i.SF.bond_validator()),claim_unbond_public:g(i.SF.claim_unbond_public()),fee_private:g(i.SF.fee_private()),fee_public:g(i.SF.fee_public()),inclusion:g(i.SF.inclusion()),join:g(i.SF.join()),set_validator_state:g(i.SF.set_validator_state()),split:g(i.SF.split()),transfer_private:g(i.SF.transfer_private()),transfer_private_to_public:g(i.SF.transfer_private_to_public()),transfer_public:g(i.SF.transfer_public()),transfer_public_as_signer:g(i.SF.transfer_public_as_signer()),transfer_public_to_private:g(i.SF.transfer_public_to_private()),unbond_public:g(i.SF.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},E=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),V=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),R=new Set(["private","transfer_private","transferPrivate"]),F=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),x=new Set(["public","transfer_public","transferPublic"]),C=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),A=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function l(e){throw console.error(e),e}async function u(){console.warn("initializeWasm is deprecated, you no longer need to use it")}n()}catch(B){n(B)}}))},9933:(e,t,r)=>{r.a(e,(async(e,n)=>{try{function i(e,t,r,n){return new Promise((i=>{const _=new Worker(e,{type:"module"});_.addEventListener("message",(e=>{setTimeout((()=>{i(_),_.unref&&_.unref()}),0)}),{capture:!0,once:!0}),_.postMessage({module:t,memory:r,address:n})}))}let B;r.d(t,{$r:()=>Ie,CK:()=>A,Gd:()=>Be,IO:()=>We,L:()=>Me,PD:()=>$e,Pc:()=>De,SF:()=>Ae,XV:()=>qe,YW:()=>Le,_U:()=>xe,_q:()=>Oe,fW:()=>je,gN:()=>Ce,hz:()=>He,kL:()=>Re,o:()=>Fe,uq:()=>ze,zW:()=>Ne});const U=new Array(128).fill(void 0);function _(e){return U[e]}U.push(void 0,null,!0,!1);let O=U.length;function a(e){e<132||(U[e]=O,O=e)}function o(e){const t=_(e);return a(e),t}const z="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&z.decode();let I=null;function s(){return null!==I&&I.buffer===B.memory.buffer||(I=new Uint8Array(B.memory.buffer)),I}function c(e,t){return e>>>=0,z.decode(s().slice(e,e+t))}function d(e){O===U.length&&U.push(U.length+1);const t=O;return O=U[t],U[t]=e,t}let N=0;const j="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},$=function(e,t){const r=j.encode(e);return t.set(r),{read:e.length,written:r.length}};function g(e,t,r){if(void 0===r){const r=j.encode(e),n=t(r.length,1)>>>0;return s().subarray(n,n+r.length).set(r),N=r.length,n}let n=e.length,i=t(n,1)>>>0;const _=s();let a=0;for(;a127)break;_[i+a]=t}if(a!==n){0!==a&&(e=e.slice(a)),i=r(i,n,n=a+3*e.length,1)>>>0;const t=s().subarray(i+a,i+n);a+=$(e,t).written,i=r(i,n,a,1)>>>0}return N=a,i}function l(e){return null==e}let M=null;function u(){return null!==M&&M.buffer===B.memory.buffer||(M=new Int32Array(B.memory.buffer)),M}function f(e){const t=typeof e;if("number"==t||"boolean"==t||null==e)return`${e}`;if("string"==t)return`"${e}"`;if("symbol"==t){const t=e.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=e.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(e)){const t=e.length;let r="[";t>0&&(r+=f(e[0]));for(let n=1;n1))return toString.call(e);if(n=r[1],"Object"==n)try{return"Object("+JSON.stringify(e)+")"}catch(e){return"Object"}return e instanceof Error?`${e.name}: ${e.message}\n${e.stack}`:n}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>{B.__wbindgen_export_3.get(e.dtor)(e.a,e.b)}));function w(e,t,r,n){const i={a:e,b:t,cnt:1,dtor:r},_=(...e)=>{i.cnt++;const t=i.a;i.a=0;try{return n(t,i.b,...e)}finally{0==--i.cnt?(B.__wbindgen_export_3.get(i.dtor)(t,i.b),D.unregister(i)):i.a=t}};return _.original=i,D.register(_,i,i),_}function b(e,t,r){B._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(e,t,d(r))}function p(e,t){if(!(e instanceof t))throw new Error(`expected instance of ${t.name}`);return e.ptr}function y(e,t){const r=t(1*e.length,1)>>>0;return s().set(e,r/1),N=e.length,r}function h(e,t,r,n){try{const a=B.__wbindgen_add_to_stack_pointer(-16);p(e,X),p(t,Ke),p(r,de);const s=g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.verifyFunctionExecution(a,e.__wbg_ptr,t.__wbg_ptr,r.__wbg_ptr,s,c);var i=u()[a/4+0],_=u()[a/4+1];if(u()[a/4+2])throw o(_);return 0!==i}finally{B.__wbindgen_add_to_stack_pointer(16)}}let L=null;function v(){return null!==L&&L.buffer===B.memory.buffer||(L=new BigInt64Array(B.memory.buffer)),L}function m(e,t){return e>>>=0,s().subarray(e/1,e/1+t)}function P(e){B.runRayonThread(e)}function k(e,t){return o(B.initThreadPool(d(e),t))}function K(e,t){try{return e.apply(this,t)}catch(e){B.__wbindgen_exn_store(d(e))}}function S(e,t,r,n){B.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(e,t,d(r),d(n))}const W="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_address_free(e>>>0)));let q=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,W.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,W.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_address_free(e)}static from_private_key(t){p(t,ae);const r=B.address_from_private_key(t.__wbg_ptr);return e.__wrap(r)}static from_view_key(t){p(t,Te);const r=B.address_from_view_key(t.__wbg_ptr);return e.__wrap(r)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.address_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.address_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}verify(e,t){const r=y(e,B.__wbindgen_malloc),n=N;p(t,ve);return 0!==B.address_verify(this.__wbg_ptr,r,n,t.__wbg_ptr)}};const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_execution_free(e>>>0)));let X=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,H.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_execution_free(e)}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.execution_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.execution_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const J="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_executionresponse_free(e>>>0)));let Y=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,J.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,J.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_executionresponse_free(e)}getOutputs(){return o(B.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const e=B.executionresponse_getExecution(this.__wbg_ptr);return 0===e?void 0:X.__wrap(e)}getKeys(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.executionresponse_getKeys(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return ee.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const e=B.executionresponse_getProvingKey(this.__wbg_ptr);return 0===e?void 0:fe.__wrap(e)}getVerifyingKey(){const e=B.executionresponse_getVerifyingKey(this.__wbg_ptr);return Ke.__wrap(e)}getFunctionId(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}getProgram(){const e=B.executionresponse_getProgram(this.__wbg_ptr);return de.__wrap(e)}};const G="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_field_free(e>>>0)));let Q=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,G.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,G.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_field_free(e)}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.field_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.field_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_keypair_free(e>>>0)));class ee{static __wrap(e){e>>>=0;const t=Object.create(ee.prototype);return t.__wbg_ptr=e,Z.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_keypair_free(e)}constructor(e,t){p(e,fe);var r=e.__destroy_into_raw();p(t,Ke);var n=t.__destroy_into_raw();const i=B.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.keypair_provingKey(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return fe.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.keypair_verifyingKey(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return Ke.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}}const te="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_metadata_free(e>>>0)));let re=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,te.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,te.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_metadata_free(e)}get name(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_name(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set name(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_name(this.__wbg_ptr,t,r)}get locator(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set locator(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_locator(this.__wbg_ptr,t,r)}get prover(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set prover(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_prover(this.__wbg_ptr,t,r)}get verifier(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set verifier(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_verifier(this.__wbg_ptr,t,r)}get verifyingKey(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set verifyingKey(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,r)}static baseUrl(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.metadata_baseUrl(i);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static bond_public(){const t=B.metadata_bond_public();return e.__wrap(t)}static bond_validator(){const t=B.metadata_bond_validator();return e.__wrap(t)}static claim_unbond_public(){const t=B.metadata_claim_unbond_public();return e.__wrap(t)}static fee_private(){const t=B.metadata_fee_private();return e.__wrap(t)}static fee_public(){const t=B.metadata_fee_public();return e.__wrap(t)}static inclusion(){const t=B.metadata_inclusion();return e.__wrap(t)}static join(){const t=B.metadata_join();return e.__wrap(t)}static set_validator_state(){const t=B.metadata_set_validator_state();return e.__wrap(t)}static split(){const t=B.metadata_split();return e.__wrap(t)}static transfer_private(){const t=B.metadata_transfer_private();return e.__wrap(t)}static transfer_private_to_public(){const t=B.metadata_transfer_private_to_public();return e.__wrap(t)}static transfer_public(){const t=B.metadata_transfer_public();return e.__wrap(t)}static transfer_public_as_signer(){const t=B.metadata_transfer_public_as_signer();return e.__wrap(t)}static transfer_public_to_private(){const t=B.metadata_transfer_public_to_private();return e.__wrap(t)}static unbond_public(){const t=B.metadata_unbond_public();return e.__wrap(t)}};const ne="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_offlinequery_free(e>>>0)));let ie=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ne.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ne.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_offlinequery_free(e)}constructor(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.offlinequery_new(n,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return this.__wbg_ptr=t>>>0,this}finally{B.__wbindgen_add_to_stack_pointer(16)}}addStatePath(e,t){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N,a=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.offlinequery_addStatePath(n,this.__wbg_ptr,i,_,a,s);var r=u()[n/4+0];if(u()[n/4+1])throw o(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.offlinequery_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.offlinequery_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const _e="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_privatekey_free(e>>>0)));let ae=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,_e.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,_e.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_privatekey_free(e)}constructor(){const e=B.privatekey_new();return this.__wbg_ptr=e>>>0,this}static from_seed_unchecked(t){const r=y(t,B.__wbindgen_malloc),n=N,i=B.privatekey_from_seed_unchecked(r,n);return e.__wrap(i)}static from_string(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.privatekey_from_string(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.privatekey_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}to_view_key(){const e=B.privatekey_to_view_key(this.__wbg_ptr);return Te.__wrap(e)}to_address(){const e=B.privatekey_to_address(this.__wbg_ptr);return q.__wrap(e)}sign(e){const t=y(e,B.__wbindgen_malloc),r=N,n=B.privatekey_sign(this.__wbg_ptr,t,r);return ve.__wrap(n)}static newEncrypted(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekey_newEncrypted(n,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return se.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekey_toCiphertext(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return se.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,r){try{const _=B.__wbindgen_add_to_stack_pointer(-16);p(t,se);const a=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.privatekey_fromPrivateKeyCiphertext(_,t.__wbg_ptr,a,s);var n=u()[_/4+0],i=u()[_/4+1];if(u()[_/4+2])throw o(i);return e.__wrap(n)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const oe="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_privatekeyciphertext_free(e>>>0)));let se=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,oe.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,oe.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_privatekeyciphertext_free(e)}static encryptPrivateKey(t,r){try{const _=B.__wbindgen_add_to_stack_pointer(-16);p(t,ae);const a=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.privatekey_toCiphertext(_,t.__wbg_ptr,a,s);var n=u()[_/4+0],i=u()[_/4+1];if(u()[_/4+2])throw o(i);return e.__wrap(n)}finally{B.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekeyciphertext_decryptToPrivateKey(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return ae.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.privatekeyciphertext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const ce="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_program_free(e>>>0)));let de=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ce.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ce.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_program_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.program_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.program_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}hasFunction(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;return 0!==B.program_hasFunction(this.__wbg_ptr,t,r)}getFunctions(){return o(B.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getFunctionInputs(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.program_getMappings(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return o(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getRecordMembers(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getStructMembers(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=B.program_getCreditsProgram();return e.__wrap(t)}id(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.program_id(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}address(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.program_address(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return q.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){p(t,e);return 0!==B.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return o(B.program_getImports(this.__wbg_ptr))}};const ge="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_programmanager_free(e>>>0)));let le=class{__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ge.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_programmanager_free(e)}static buildDeploymentTransaction(e,t,r,n,i,_,a,s,c){p(e,ae);const u=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),f=N;let w=0;l(n)||(p(n,ye),w=n.__destroy_into_raw());var b=l(i)?0:g(i,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N;let h=0;l(a)||(p(a,fe),h=a.__destroy_into_raw());let v=0;l(s)||(p(s,Ke),v=s.__destroy_into_raw());let m=0;l(c)||(p(c,ie),m=c.__destroy_into_raw());return o(B.programmanager_buildDeploymentTransaction(e.__wbg_ptr,u,f,r,w,b,y,l(_)?0:d(_),h,v,m))}static estimateDeploymentFee(e,t){const r=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;return o(B.programmanager_estimateDeploymentFee(r,n,l(t)?0:d(t)))}static estimateProgramNameCost(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.programmanager_estimateProgramNameCost(n,i,_);var t=v()[n/8+0],r=u()[n/4+2];if(u()[n/4+3])throw o(r);return BigInt.asUintN(64,t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(e,t,r,n,i,_,a,s,c,u,f){p(e,ae);const w=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),b=N,y=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(s)||(p(s,fe),v=s.__destroy_into_raw());let m=0;l(c)||(p(c,Ke),m=c.__destroy_into_raw());var P=l(u)?0:g(u,B.__wbindgen_malloc,B.__wbindgen_realloc),k=N;let K=0;l(f)||(p(f,ie),K=f.__destroy_into_raw());return o(B.programmanager_executeFunctionOffline(e.__wbg_ptr,w,b,y,h,d(n),i,_,l(a)?0:d(a),v,m,P,k,K))}static buildExecutionTransaction(e,t,r,n,i,_,a,s,c,u,f,w,b){p(e,ae);const y=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N,v=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),m=N;let P=0;l(_)||(p(_,ye),P=_.__destroy_into_raw());var k=l(a)?0:g(a,B.__wbindgen_malloc,B.__wbindgen_realloc),K=N;let S=0;l(c)||(p(c,fe),S=c.__destroy_into_raw());let T=0;l(u)||(p(u,Ke),T=u.__destroy_into_raw());let E=0;l(f)||(p(f,fe),E=f.__destroy_into_raw());let V=0;l(w)||(p(w,Ke),V=w.__destroy_into_raw());let R=0;l(b)||(p(b,ie),R=b.__destroy_into_raw());return o(B.programmanager_buildExecutionTransaction(e.__wbg_ptr,y,h,v,m,d(n),i,P,k,K,l(s)?0:d(s),S,T,E,V,R))}static estimateExecutionFee(e,t,r,n,i,_,a,s,c){p(e,ae);const u=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),f=N,w=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),b=N;var y=l(i)?0:g(i,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(a)||(p(a,fe),v=a.__destroy_into_raw());let m=0;l(s)||(p(s,Ke),m=s.__destroy_into_raw());let P=0;l(c)||(p(c,ie),P=c.__destroy_into_raw());return o(B.programmanager_estimateExecutionFee(e.__wbg_ptr,u,f,w,b,d(n),y,h,l(_)?0:d(_),v,m,P))}static estimateFinalizeFee(e,t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.programmanager_estimateFinalizeFee(i,_,a,s,c);var r=v()[i/8+0],n=u()[i/4+2];if(u()[i/4+3])throw o(n);return BigInt.asUintN(64,r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(e,t,r,n,i,_,a,s,c,d,u){p(e,ae),p(t,ye);var f=t.__destroy_into_raw();p(r,ye);var w=r.__destroy_into_raw();let b=0;l(i)||(p(i,ye),b=i.__destroy_into_raw());var y=l(_)?0:g(_,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(a)||(p(a,fe),v=a.__destroy_into_raw());let m=0;l(s)||(p(s,Ke),m=s.__destroy_into_raw());let P=0;l(c)||(p(c,fe),P=c.__destroy_into_raw());let k=0;l(d)||(p(d,Ke),k=d.__destroy_into_raw());let K=0;l(u)||(p(u,ie),K=u.__destroy_into_raw());return o(B.programmanager_buildJoinTransaction(e.__wbg_ptr,f,w,n,b,y,h,v,m,P,k,K))}static buildSplitTransaction(e,t,r,n,i,_,a){p(e,ae),p(r,ye);var s=r.__destroy_into_raw(),c=l(n)?0:g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),d=N;let u=0;l(i)||(p(i,fe),u=i.__destroy_into_raw());let f=0;l(_)||(p(_,Ke),f=_.__destroy_into_raw());let w=0;l(a)||(p(a,ie),w=a.__destroy_into_raw());return o(B.programmanager_buildSplitTransaction(e.__wbg_ptr,t,s,c,d,u,f,w))}static buildTransferTransaction(e,t,r,n,i,_,a,s,c,d,u,f,w){p(e,ae);const b=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N,h=g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),v=N;let m=0;l(i)||(p(i,ye),m=i.__destroy_into_raw());let P=0;l(a)||(p(a,ye),P=a.__destroy_into_raw());var k=l(s)?0:g(s,B.__wbindgen_malloc,B.__wbindgen_realloc),K=N;let S=0;l(c)||(p(c,fe),S=c.__destroy_into_raw());let T=0;l(d)||(p(d,Ke),T=d.__destroy_into_raw());let E=0;l(u)||(p(u,fe),E=u.__destroy_into_raw());let V=0;l(f)||(p(f,Ke),V=f.__destroy_into_raw());let R=0;l(w)||(p(w,ie),R=w.__destroy_into_raw());return o(B.programmanager_buildTransferTransaction(e.__wbg_ptr,t,b,y,h,v,m,_,P,k,K,S,T,E,V,R))}static synthesizeKeyPair(e,t,r,n,i){p(e,ae);const _=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;return o(B.programmanager_synthesizeKeyPair(e.__wbg_ptr,_,a,s,c,d(n),l(i)?0:d(i)))}};const ue="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_provingkey_free(e>>>0)));let fe=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ue.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ue.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_provingkey_free(e)}isBondPublicProver(){return 0!==B.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==B.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==B.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==B.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==B.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==B.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==B.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==B.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==B.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==B.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==B.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==B.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==B.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==B.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==B.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_checksum(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}copy(){const t=B.provingkey_copy(this.__wbg_ptr);return e.__wrap(t)}static fromBytes(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=y(t,B.__wbindgen_malloc),a=N;B.provingkey_fromBytes(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.provingkey_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_toBytes(i,this.__wbg_ptr);var e=u()[i/4+0],t=u()[i/4+1],r=u()[i/4+2];if(u()[i/4+3])throw o(r);var n=m(e,t).slice();return B.__wbindgen_free(e,1*t,1),n}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const we="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_recordciphertext_free(e>>>0)));let be=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,we.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,we.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_recordciphertext_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.recordciphertext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordciphertext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}decrypt(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16);p(e,Te),B.recordciphertext_decrypt(n,this.__wbg_ptr,e.__wbg_ptr);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return ye.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}isOwner(e){p(e,Te);return 0!==B.recordciphertext_isOwner(this.__wbg_ptr,e.__wbg_ptr)}};const pe="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_recordplaintext_free(e>>>0)));let ye=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,pe.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,pe.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_recordplaintext_free(e)}commitment(e,t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.recordplaintext_commitment(i,this.__wbg_ptr,_,a,s,c);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return Q.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.recordplaintext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordplaintext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}microcredits(){const e=B.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,e)}nonce(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordplaintext_nonce(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}serialNumberString(e,t,r){let n,i;try{const w=B.__wbindgen_add_to_stack_pointer(-16);p(e,ae);const b=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N,h=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),v=N;B.recordplaintext_serialNumberString(w,this.__wbg_ptr,e.__wbg_ptr,b,y,h,v);var _=u()[w/4+0],a=u()[w/4+1],s=u()[w/4+2],d=u()[w/4+3],l=_,f=a;if(d)throw l=0,f=0,o(s);return n=l,i=f,c(l,f)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(n,i,1)}}};const he="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_signature_free(e>>>0)));let ve=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,he.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,he.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_signature_free(e)}static sign(t,r){p(t,ae);const n=y(r,B.__wbindgen_malloc),i=N,_=B.privatekey_sign(t.__wbg_ptr,n,i);return e.__wrap(_)}verify(e,t){p(e,q);const r=y(t,B.__wbindgen_malloc),n=N;return 0!==B.signature_verify(this.__wbg_ptr,e.__wbg_ptr,r,n)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.signature_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.signature_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const me="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_transaction_free(e>>>0)));let Pe=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,me.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,me.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_transaction_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.transaction_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}transactionId(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_transactionId(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}transactionType(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_transactionType(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const ke="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_verifyingkey_free(e>>>0)));let Ke=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ke.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ke.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_verifyingkey_free(e)}static bondPublicVerifier(){const t=B.verifyingkey_bondPublicVerifier();return e.__wrap(t)}static bondValidatorVerifier(){const t=B.verifyingkey_bondValidatorVerifier();return e.__wrap(t)}static claimUnbondPublicVerifier(){const t=B.verifyingkey_claimUnbondPublicVerifier();return e.__wrap(t)}static feePrivateVerifier(){const t=B.verifyingkey_feePrivateVerifier();return e.__wrap(t)}static feePublicVerifier(){const t=B.verifyingkey_feePublicVerifier();return e.__wrap(t)}static inclusionVerifier(){const t=B.verifyingkey_inclusionVerifier();return e.__wrap(t)}static joinVerifier(){const t=B.verifyingkey_joinVerifier();return e.__wrap(t)}static setValidatorStateVerifier(){const t=B.verifyingkey_setValidatorStateVerifier();return e.__wrap(t)}static splitVerifier(){const t=B.verifyingkey_splitVerifier();return e.__wrap(t)}static transferPrivateVerifier(){const t=B.verifyingkey_transferPrivateVerifier();return e.__wrap(t)}static transferPrivateToPublicVerifier(){const t=B.verifyingkey_transferPrivateToPublicVerifier();return e.__wrap(t)}static transferPublicVerifier(){const t=B.verifyingkey_transferPublicVerifier();return e.__wrap(t)}static transferPublicAsSignerVerifier(){const t=B.verifyingkey_transferPublicAsSignerVerifier();return e.__wrap(t)}static transferPublicToPrivateVerifier(){const t=B.verifyingkey_transferPublicToPrivateVerifier();return e.__wrap(t)}static unbondPublicVerifier(){const t=B.verifyingkey_unbondPublicVerifier();return e.__wrap(t)}isBondPublicVerifier(){return 0!==B.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==B.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==B.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==B.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==B.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==B.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==B.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==B.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==B.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==B.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==B.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==B.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==B.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==B.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==B.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_checksum(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}copy(){const t=B.verifyingkey_copy(this.__wbg_ptr);return e.__wrap(t)}static fromBytes(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=y(t,B.__wbindgen_malloc),a=N;B.verifyingkey_fromBytes(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.verifyingkey_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_toBytes(i,this.__wbg_ptr);var e=u()[i/4+0],t=u()[i/4+1],r=u()[i/4+2];if(u()[i/4+3])throw o(r);var n=m(e,t).slice();return B.__wbindgen_free(e,1*t,1),n}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const Se="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_viewkey_free(e>>>0)));let Te=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,Se.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,Se.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_viewkey_free(e)}static from_private_key(t){p(t,ae);const r=B.privatekey_to_view_key(t.__wbg_ptr);return e.__wrap(r)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.viewkey_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.viewkey_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}to_address(){const e=B.address_from_view_key(this.__wbg_ptr);return q.__wrap(e)}decrypt(e){let t,r;try{const l=B.__wbindgen_add_to_stack_pointer(-16),f=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),w=N;B.viewkey_decrypt(l,this.__wbg_ptr,f,w);var n=u()[l/4+0],i=u()[l/4+1],_=u()[l/4+2],a=u()[l/4+3],s=n,d=i;if(a)throw s=0,d=0,o(_);return t=s,r=d,c(s,d)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(t,r,1)}}};async function T(e,t){if("function"==typeof Response&&e instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(e,t)}catch(t){if("application/wasm"==e.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const r=await e.arrayBuffer();return await WebAssembly.instantiate(r,t)}{const r=await WebAssembly.instantiate(e,t);return r instanceof WebAssembly.Instance?{instance:r,module:e}:r}}function E(){const e={wbg:{}};return e.wbg.__wbindgen_object_drop_ref=function(e){o(e)},e.wbg.__wbg_new_71801a555ad9f2aa=function(){return K((function(){return d(new XMLHttpRequest)}),arguments)},e.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return K((function(e,t,r){_(e).overrideMimeType(c(t,r))}),arguments)},e.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return K((function(e,t,r,n,i,a){_(e).open(c(t,r),c(n,i),0!==a)}),arguments)},e.wbg.__wbg_send_80d29985093c1ec5=function(){return K((function(e){_(e).send()}),arguments)},e.wbg.__wbg_response_7c2e2759084f7279=function(){return K((function(e){return d(_(e).response)}),arguments)},e.wbg.__wbg_status_d485fb5a478426fb=function(){return K((function(e){return _(e).status}),arguments)},e.wbg.__wbg_new_72fb9a18b5ae2624=function(){return d(new Object)},e.wbg.__wbindgen_string_new=function(e,t){return d(c(e,t))},e.wbg.__wbg_set_1f9b04f170055d33=function(){return K((function(e,t,r){return Reflect.set(_(e),_(t),_(r))}),arguments)},e.wbg.__wbg_new_ab6fd82b10560829=function(){return K((function(){return d(new Headers)}),arguments)},e.wbg.__wbindgen_object_clone_ref=function(e){return d(_(e))},e.wbg.__wbg_new_0d76b0581eca6298=function(){return K((function(){return d(new AbortController)}),arguments)},e.wbg.__wbg_signal_a61f78a3478fd9bc=function(e){return d(_(e).signal)},e.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return K((function(e,t,r,n,i){_(e).append(c(t,r),c(n,i))}),arguments)},e.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(e){let t;try{t=_(e)instanceof Response}catch(e){t=!1}return t},e.wbg.__wbg_status_61a01141acd3cf74=function(e){return _(e).status},e.wbg.__wbg_url_5f6dc4009ac5f99d=function(e,t){const r=g(_(t).url,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbg_headers_9620bfada380764a=function(e){return d(_(e).headers)},e.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return d(Symbol.iterator)},e.wbg.__wbg_get_e3c254076557e348=function(){return K((function(e,t){return d(Reflect.get(_(e),_(t)))}),arguments)},e.wbg.__wbindgen_is_function=function(e){return"function"==typeof _(e)},e.wbg.__wbg_call_27c0f87801dedf93=function(){return K((function(e,t){return d(_(e).call(_(t)))}),arguments)},e.wbg.__wbindgen_is_object=function(e){const t=_(e);return"object"==typeof t&&null!==t},e.wbg.__wbg_next_40fc327bfc8770e6=function(e){return d(_(e).next)},e.wbg.__wbg_next_196c84450b364254=function(){return K((function(e){return d(_(e).next())}),arguments)},e.wbg.__wbg_done_298b57d23c0fc80c=function(e){return _(e).done},e.wbg.__wbg_value_d93c65011f51a456=function(e){return d(_(e).value)},e.wbg.__wbg_abort_2aa7521d5690750e=function(e){_(e).abort()},e.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return K((function(e){return d(JSON.stringify(_(e)))}),arguments)},e.wbg.__wbindgen_string_get=function(e,t){const r=_(t),n="string"==typeof r?r:void 0;var i=l(n)?0:g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;u()[e/4+1]=a,u()[e/4+0]=i},e.wbg.__wbg_executionresponse_new=function(e){return d(Y.__wrap(e))},e.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return K((function(e,t,r){return d(_(e).call(_(t),_(r)))}),arguments)},e.wbg.__wbg_log_0159ca40cddf5b15=function(e,t){console.log(c(e,t))},e.wbg.__wbg_newwithlength_66ae46612e7f0234=function(e){return d(new Array(e>>>0))},e.wbg.__wbg_set_d4638f722068f043=function(e,t,r){_(e)[t>>>0]=o(r)},e.wbg.__wbg_transaction_new=function(e){return d(Pe.__wrap(e))},e.wbg.__wbindgen_bigint_from_u64=function(e){return d(BigInt.asUintN(64,e))},e.wbg.__wbg_keypair_new=function(e){return d(ee.__wrap(e))},e.wbg.__wbindgen_module=function(){return d(x.__wbindgen_wasm_module)},e.wbg.__wbindgen_memory=function(){return d(B.memory)},e.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(e,t,r,n){return d(i(_(e),_(t),_(r),n>>>0))},e.wbg.__wbindgen_cb_drop=function(e){const t=o(e).original;if(1==t.cnt--)return t.a=0,!0;return!1},e.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return d(new Array)},e.wbg.__wbg_push_a5b05aedc7234f9f=function(e,t){return _(e).push(_(t))},e.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return K((function(e){return d(_(e).arrayBuffer())}),arguments)},e.wbg.__wbg_new_63b92bc8671ed464=function(e){return d(new Uint8Array(_(e)))},e.wbg.__wbg_length_c20a40f15020d68a=function(e){return _(e).length},e.wbg.__wbg_new_81740750da40724f=function(e,t){try{var r={a:e,b:t};const n=new Promise(((e,t)=>{const n=r.a;r.a=0;try{return S(n,r.b,e,t)}finally{r.a=n}}));return d(n)}finally{r.a=r.b=0}},e.wbg.__wbindgen_number_new=function(e){return d(e)},e.wbg.__wbg_new_abda76e883ba8a5f=function(){return d(new Error)},e.wbg.__wbg_stack_658279fe44541cf6=function(e,t){const r=g(_(t).stack,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbg_error_f851667af71bcfc6=function(e,t){let r,n;try{r=e,n=t,console.error(c(e,t))}finally{B.__wbindgen_free(r,n,1)}},e.wbg.__wbg_buffer_12d079cc21e14bdb=function(e){return d(_(e).buffer)},e.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(e,t,r){return d(new Uint8Array(_(e),t>>>0,r>>>0))},e.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return K((function(e,t){_(e).randomFillSync(o(t))}),arguments)},e.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(e,t,r){return d(_(e).subarray(t>>>0,r>>>0))},e.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return K((function(e,t){_(e).getRandomValues(_(t))}),arguments)},e.wbg.__wbg_set_a47bac70306a19a7=function(e,t,r){_(e).set(_(t),r>>>0)},e.wbg.__wbg_crypto_1d1f22824a6a080c=function(e){return d(_(e).crypto)},e.wbg.__wbg_process_4a72847cc503995b=function(e){return d(_(e).process)},e.wbg.__wbg_versions_f686565e586dd935=function(e){return d(_(e).versions)},e.wbg.__wbg_node_104a2ff8d6ea03a2=function(e){return d(_(e).node)},e.wbg.__wbindgen_is_string=function(e){return"string"==typeof _(e)},e.wbg.__wbg_require_cca90b1a94a0255b=function(){return K((function(){return d(module.require)}),arguments)},e.wbg.__wbg_msCrypto_eb05e62b530a1508=function(e){return d(_(e).msCrypto)},e.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(e){return d(new Uint8Array(e>>>0))},e.wbg.__wbg_length_cd7af8117672b8b8=function(e){return _(e).length},e.wbg.__wbg_get_bd8e338fbd5f5cc8=function(e,t){return d(_(e)[t>>>0])},e.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return K((function(){return d(self.self)}),arguments)},e.wbg.__wbg_window_c6fb939a7f436783=function(){return K((function(){return d(window.window)}),arguments)},e.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return K((function(){return d(globalThis.globalThis)}),arguments)},e.wbg.__wbg_global_207b558942527489=function(){return K((function(){return d(global.global)}),arguments)},e.wbg.__wbindgen_is_undefined=function(e){return void 0===_(e)},e.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(e,t){return d(new Function(c(e,t)))},e.wbg.__wbg_has_0af94d20077affa2=function(){return K((function(e,t){return Reflect.has(_(e),_(t))}),arguments)},e.wbg.__wbg_fetch_bc7c8e27076a5c84=function(e){return d(fetch(_(e)))},e.wbg.__wbg_fetch_921fad6ef9e883dd=function(e,t){return d(_(e).fetch(_(t)))},e.wbg.__wbindgen_debug_string=function(e,t){const r=g(f(_(t)),B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbindgen_throw=function(e,t){throw new Error(c(e,t))},e.wbg.__wbindgen_rethrow=function(e){throw o(e)},e.wbg.__wbg_then_a73caa9a87991566=function(e,t,r){return d(_(e).then(_(t),_(r)))},e.wbg.__wbg_then_0c86a60e8fcfe9f6=function(e,t){return d(_(e).then(_(t)))},e.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(e){queueMicrotask(_(e))},e.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(e){return d(_(e).queueMicrotask)},e.wbg.__wbg_resolve_b0083a7967828ec8=function(e){return d(Promise.resolve(_(e)))},e.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return d(Atomics.waitAsync)},e.wbg.__wbg_new_8cccba86b0f574cb=function(e){return d(new Int32Array(_(e)))},e.wbg.__wbg_waitAsync_46d5c36955b71a79=function(e,t,r){return d(Atomics.waitAsync(_(e),t,r))},e.wbg.__wbg_async_19c0400d97cc72fe=function(e){return _(e).async},e.wbg.__wbg_value_571d60108110e917=function(e){return d(_(e).value)},e.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(e){const t=g("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;u()[e/4+1]=r,u()[e/4+0]=t},e.wbg.__wbg_new_d1187ae36d662ef9=function(){return K((function(e,t){return d(new Worker(c(e,t)))}),arguments)},e.wbg.__wbg_setonmessage_503809e5bb51bd33=function(e,t){_(e).onmessage=_(t)},e.wbg.__wbg_of_6a70eed8d41f469c=function(e,t,r){return d(Array.of(_(e),_(t),_(r)))},e.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return K((function(e,t){_(e).postMessage(_(t))}),arguments)},e.wbg.__wbg_data_3ce7c145ca4fbcdc=function(e){return d(_(e).data)},e.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return K((function(e,t,r){return d(new Request(c(e,t),_(r)))}),arguments)},e.wbg.__wbg_responseText_c67ed2d48db10769=function(){return K((function(e,t){const r=_(t).responseText;var n=l(r)?0:g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),i=N;u()[e/4+1]=i,u()[e/4+0]=n}),arguments)},e.wbg.__wbindgen_closure_wrapper5837=function(e,t,r){return d(w(e,t,538,b))},e.wbg.__wbindgen_closure_wrapper5862=function(e,t,r){return d(w(e,t,538,b))},e}function V(e,t){e.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(e,t){return B=e.exports,x.__wbindgen_wasm_module=t,L=null,M=null,I=null,B.__wbindgen_start(),B}function F(e,t){if(void 0!==B)return B;const r=E();V(r,t),e instanceof WebAssembly.Module||(e=new WebAssembly.Module(e));return R(new WebAssembly.Instance(e,r),e)}async function x(e,t){if(void 0!==B)return B;const r=E();("string"==typeof e||"function"==typeof Request&&e instanceof Request||"function"==typeof URL&&e instanceof URL)&&(e=fetch(e)),V(r,t);const{instance:n,module:i}=await T(await e,r);return R(n,i)}var C=Object.freeze({__proto__:null,Address:q,Execution:X,ExecutionResponse:Y,Field:Q,KeyPair:ee,Metadata:re,OfflineQuery:ie,PrivateKey:ae,PrivateKeyCiphertext:se,Program:de,ProgramManager:le,ProvingKey:fe,RecordCiphertext:be,RecordPlaintext:ye,Signature:ve,Transaction:Pe,VerifyingKey:Ke,ViewKey:Te,default:x,initSync:F,initThreadPool:k,runRayonThread:P,verifyFunctionExecution:h});const Ee="assets/aleo_wasm.wasm";const{initThreadPool:Ve,Address:Re,Execution:Fe,ExecutionResponse:xe,Field:Ce,Metadata:Ae,OfflineQuery:Be,Private:Ue,PrivateKey:Oe,PrivateKeyCiphertext:ze,Program:Ie,ProvingKey:Ne,RecordCiphertext:je,RecordPlaintext:$e,ProgramManager:Me,Signature:De,Transaction:Le,ViewKey:We,VerifyingKey:qe,verifyFunctionExecution:He}=await(async(e={})=>{let{importHook:t,serverPath:r,initializeHook:n}=e,i=Ee;return null!=r&&(i=r+/[^\/\\]*$/.exec(i)[0]),null!=t&&(i=t(i)),null!=n?await n(x,i):await x(i),C})({importHook:()=>new URL(r(5934),r.b)});async function A(e){null==e&&(e=navigator.hardwareConcurrency),console.info(`Spawning ${e} threads`),await Ve(new URL(r(2583),r.b),e)}n()}catch(Xe){n(Xe)}}),1)},6891:(e,t,r)=>{r.d(t,{Ud:()=>l});const n=Symbol("Comlink.proxy"),i=Symbol("Comlink.endpoint"),_=Symbol("Comlink.releaseProxy"),a=Symbol("Comlink.finalizer"),o=Symbol("Comlink.thrown"),s=e=>"object"==typeof e&&null!==e||"function"==typeof e,c=new Map([["proxy",{canHandle:e=>s(e)&&e[n],serialize(e){const{port1:t,port2:r}=new MessageChannel;return d(e,t),[r,[r]]},deserialize:e=>(e.start(),l(e))}],["throw",{canHandle:e=>s(e)&&o in e,serialize({value:e}){let t;return t=e instanceof Error?{isError:!0,value:{message:e.message,name:e.name,stack:e.stack}}:{isError:!1,value:e},[t,[]]},deserialize(e){if(e.isError)throw Object.assign(new Error(e.value.message),e.value);throw e.value}}]]);function d(e,t=globalThis,r=["*"]){t.addEventListener("message",(function i(_){if(!_||!_.data)return;if(!function(e,t){for(const r of e){if(t===r||"*"===r)return!0;if(r instanceof RegExp&&r.test(t))return!0}return!1}(r,_.origin))return void console.warn(`Invalid origin '${_.origin}' for comlink proxy`);const{id:s,type:c,path:l}=Object.assign({path:[]},_.data),u=(_.data.argumentList||[]).map(m);let f;try{const t=l.slice(0,-1).reduce(((e,t)=>e[t]),e),r=l.reduce(((e,t)=>e[t]),e);switch(c){case"GET":f=r;break;case"SET":t[l.slice(-1)[0]]=m(_.data.value),f=!0;break;case"APPLY":f=r.apply(t,u);break;case"CONSTRUCT":f=function(e){return Object.assign(e,{[n]:!0})}(new r(...u));break;case"ENDPOINT":{const{port1:t,port2:r}=new MessageChannel;d(e,r),f=function(e,t){return h.set(e,t),e}(t,[t])}break;case"RELEASE":f=void 0;break;default:return}}catch(e){f={value:e,[o]:0}}Promise.resolve(f).catch((e=>({value:e,[o]:0}))).then((r=>{const[n,_]=v(r);t.postMessage(Object.assign(Object.assign({},n),{id:s}),_),"RELEASE"===c&&(t.removeEventListener("message",i),g(t),a in e&&"function"==typeof e[a]&&e[a]())})).catch((e=>{const[r,n]=v({value:new TypeError("Unserializable return value"),[o]:0});t.postMessage(Object.assign(Object.assign({},r),{id:s}),n)}))})),t.start&&t.start()}function g(e){(function(e){return"MessagePort"===e.constructor.name})(e)&&e.close()}function l(e,t){return p(e,[],t)}function u(e){if(e)throw new Error("Proxy has been released and is not useable")}function f(e){return P(e,{type:"RELEASE"}).then((()=>{g(e)}))}const w=new WeakMap,b="FinalizationRegistry"in globalThis&&new FinalizationRegistry((e=>{const t=(w.get(e)||0)-1;w.set(e,t),0===t&&f(e)}));function p(e,t=[],r=function(){}){let n=!1;const a=new Proxy(r,{get(r,i){if(u(n),i===_)return()=>{!function(e){b&&b.unregister(e)}(a),f(e),n=!0};if("then"===i){if(0===t.length)return{then:()=>a};const r=P(e,{type:"GET",path:t.map((e=>e.toString()))}).then(m);return r.then.bind(r)}return p(e,[...t,i])},set(r,i,_){u(n);const[a,o]=v(_);return P(e,{type:"SET",path:[...t,i].map((e=>e.toString())),value:a},o).then(m)},apply(r,_,a){u(n);const o=t[t.length-1];if(o===i)return P(e,{type:"ENDPOINT"}).then(m);if("bind"===o)return p(e,t.slice(0,-1));const[s,c]=y(a);return P(e,{type:"APPLY",path:t.map((e=>e.toString())),argumentList:s},c).then(m)},construct(r,i){u(n);const[_,a]=y(i);return P(e,{type:"CONSTRUCT",path:t.map((e=>e.toString())),argumentList:_},a).then(m)}});return function(e,t){const r=(w.get(t)||0)+1;w.set(t,r),b&&b.register(e,t,e)}(a,e),a}function y(e){const t=e.map(v);return[t.map((e=>e[0])),(r=t.map((e=>e[1])),Array.prototype.concat.apply([],r))];var r}const h=new WeakMap;function v(e){for(const[t,r]of c)if(r.canHandle(e)){const[n,i]=r.serialize(e);return[{type:"HANDLER",name:t,value:n},i]}return[{type:"RAW",value:e},h.get(e)||[]]}function m(e){switch(e.type){case"HANDLER":return c.get(e.name).deserialize(e.value);case"RAW":return e.value}}function P(e,t,r){return new Promise((n=>{const i=new Array(4).fill(0).map((()=>Math.floor(Math.random()*Number.MAX_SAFE_INTEGER).toString(16))).join("-");e.addEventListener("message",(function t(r){r.data&&r.data.id&&r.data.id===i&&(e.removeEventListener("message",t),n(r.data))})),e.start&&e.start(),e.postMessage(Object.assign({id:i},t),r)}))}}}]); +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[52,933],{2583:(e,t,r)=>{e.exports=r.p+"2d6a4d794221941c07b8.js"},5934:(e,t,r)=>{e.exports=r.p+"58342153fc9a001d7976.wasm"},5052:(e,t,r)=>{r.a(e,(async(e,n)=>{try{r.r(t),r.d(t,{Account:()=>f,Address:()=>i.kL,AleoKeyProvider:()=>p,AleoKeyProviderParams:()=>b,AleoNetworkClient:()=>w,BlockHeightSearch:()=>m,CREDITS_PROGRAM_KEYS:()=>T,ExecutionResponse:()=>i._U,Field:()=>i.gN,FunctionExecution:()=>i.o,KEY_STORE:()=>S,NetworkRecordProvider:()=>v,OfflineKeyProvider:()=>h,OfflineQuery:()=>i.Gd,OfflineSearchParams:()=>y,PRIVATE_TO_PUBLIC_TRANSFER:()=>F,PRIVATE_TRANSFER:()=>R,PRIVATE_TRANSFER_TYPES:()=>E,PUBLIC_TO_PRIVATE_TRANSFER:()=>A,PUBLIC_TRANSFER:()=>x,PUBLIC_TRANSFER_AS_SIGNER:()=>C,PrivateKey:()=>i._q,PrivateKeyCiphertext:()=>i.uq,Program:()=>i.$r,ProgramManager:()=>K,ProgramManagerBase:()=>i.L,ProvingKey:()=>i.zW,RecordCiphertext:()=>i.fW,RecordPlaintext:()=>i.PD,Signature:()=>i.Pc,Transaction:()=>i.YW,VALID_TRANSFER_TYPES:()=>V,VerifyingKey:()=>i.XV,ViewKey:()=>i.IO,createAleoWorker:()=>k,initThreadPool:()=>i.CK,initializeWasm:()=>u,logAndThrow:()=>l,verifyFunctionExecution:()=>i.hz});var i=r(9933),_=r(6891),a=e([i]);i=(a.then?(await a)():a)[0];class f{_privateKey;_viewKey;_address;constructor(e={}){try{this._privateKey=this.privateKeyFromParams(e)}catch(e){throw console.error("Wrong parameter",e),new Error("Wrong Parameter")}this._viewKey=i.IO.from_private_key(this._privateKey),this._address=i.kL.from_private_key(this._privateKey)}static fromCiphertext(e,t){try{e="string"==typeof e?i.uq.fromString(e):e;const r=i._q.fromPrivateKeyCiphertext(e,t);return new f({privateKey:r.to_string()})}catch(e){throw new Error("Wrong password or invalid ciphertext")}}privateKeyFromParams(e){return e.seed?i._q.from_seed_unchecked(e.seed):e.privateKey?i._q.from_string(e.privateKey):new i._q}privateKey(){return this._privateKey}viewKey(){return this._viewKey}address(){return this._address}toString(){return this.address().to_string()}encryptAccount(e){return this._privateKey.toCiphertext(e)}decryptRecord(e){return this._viewKey.decrypt(e)}decryptRecords(e){return e.map((e=>this._viewKey.decrypt(e)))}ownsRecordCiphertext(e){if("string"!=typeof e)return e.isOwner(this._viewKey);try{return i.fW.fromString(e).isOwner(this._viewKey)}catch(e){return!1}}sign(e){return this._privateKey.sign(e)}verify(e,t){return this._address.verify(e,t)}}async function o(e,t){const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not get URL "+e);return r}async function s(e,t){t.method="POST";const r=await fetch(e,t);if(!r.ok)throw new Error(r.status+" could not post URL "+e);return r}class w{host;headers;account;constructor(e,t){this.host=e+"/testnet",t&&t.headers?this.headers=t.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const t=await o(this.host+e,{headers:this.headers});return await t.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,t,r,n,_,a){if(a=a||[],e<0)throw new Error("Start height must be greater than or equal to 0");const o=new Array;let s,c,d,g,l=0,u=BigInt(0);if(void 0===r){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");d=this.account._privateKey}else try{d=r instanceof i._q?r:i._q.from_string(r)}catch(e){throw new Error("Error parsing private key provided.")}const f=d.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");g=e}catch(e){throw new Error("Error fetching latest block height.")}if(c="number"==typeof t&&t<=g?t:g,e>c)throw new Error("Start height must be less than or equal to end height.");for(;c>e;){s=c-50,s=BigInt(_))))return o;if(void 0!==n&&n.length>0){let e=0;if(t.microcredits()>n[e]){if(e+=1,o.push(t),"number"==typeof _&&(u+=t.microcredits(),u>=BigInt(_)))return o;if(o.length>=n.length)return o}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+s.toString()+"-"+c.toString()),console.warn("Error: ",e),l+=1,l>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),o}}return o}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,t){try{return await this.fetchData("/blocks?start="+e+"&end="+t)}catch(r){throw new Error("Error fetching blocks between "+e+" and "+t+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof i.$r&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const t=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(t)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return i.$r.fromString(e)}catch(t){try{return i.$r.fromString(await this.getProgram(e))}catch(t){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const t={},r=(e instanceof i.$r?e:await this.getProgramObject(e)).getImports();for(let e=0;e{if(void 0===e)r(new Error("No search parameters provided, cannot retrieve keys"));else{const n=e.cacheKey,_=e.verifyCreditsKeys;if(this.cache.has(n)){const[e,a]=this.cache.get(n),o=i.zW.fromBytes(e),s=i.XV.fromBytes(a);if(_){this.verifyCreditsKeys(n,o,s)||r(new Error(`Cached keys do not match expected keys for ${n}`))}t([o,s])}else r(new Error("Keys not found in cache for "+n))}}))}verifyCreditsKeys(e,t,r){switch(e){case T.bond_public.locator:return t.isBondPublicProver()&&r.isBondPublicVerifier();case T.claim_unbond_public.locator:return t.isClaimUnbondPublicProver()&&r.isClaimUnbondPublicVerifier();case T.fee_private.locator:return t.isFeePrivateProver()&&r.isFeePrivateVerifier();case T.fee_public.locator:return t.isFeePublicProver()&&r.isFeePublicVerifier();case T.inclusion.locator:return t.isInclusionProver()&&r.isInclusionVerifier();case T.join.locator:return t.isJoinProver()&&r.isJoinVerifier();case T.set_validator_state.locator:return t.isSetValidatorStateProver()&&r.isSetValidatorStateVerifier();case T.split.locator:return t.isSplitProver()&&r.isSplitVerifier();case T.transfer_private.locator:return t.isTransferPrivateProver()&&r.isTransferPrivateVerifier();case T.transfer_private_to_public.locator:return t.isTransferPrivateToPublicProver()&&r.isTransferPrivateToPublicVerifier();case T.transfer_public.locator:return t.isTransferPublicProver()&&r.isTransferPublicVerifier();case T.transfer_public_to_private.locator:return t.isTransferPublicToPrivateProver()&&r.isTransferPublicToPrivateVerifier();case T.unbond_public.locator:return t.isUnbondPublicProver()&&r.isUnbondPublicVerifier();default:return!1}}feePrivateKeys(){return this.functionKeys(y.feePrivateKeyParams())}feePublicKeys(){return this.functionKeys(y.feePublicKeyParams())}joinKeys(){return this.functionKeys(y.joinKeyParams())}splitKeys(){return this.functionKeys(y.splitKeyParams())}transferKeys(e){if(R.has(e))return this.functionKeys(y.transferPrivateKeyParams());if(F.has(e))return this.functionKeys(y.transferPrivateToPublicKeyParams());if(x.has(e))return this.functionKeys(y.transferPublicKeyParams());if(C.has(e))return this.functionKeys(y.transferPublicAsSignerKeyParams());if(A.has(e))return this.functionKeys(y.transferPublicToPrivateKeyParams());throw new Error("Invalid visibility type")}async unBondPublicKeys(){return this.functionKeys(y.unbondPublicKeyParams())}insertBondPublicKeys(e){if(!e.isBondPublicProver())throw new Error("Attempted to insert invalid proving keys for bond_public");this.cache.set(T.bond_public.locator,[e.toBytes(),i.XV.bondPublicVerifier().toBytes()])}insertClaimUnbondPublicKeys(e){if(!e.isClaimUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for claim_unbond_public");this.cache.set(T.claim_unbond_public.locator,[e.toBytes(),i.XV.claimUnbondPublicVerifier().toBytes()])}insertFeePrivateKeys(e){if(!e.isFeePrivateProver())throw new Error("Attempted to insert invalid proving keys for fee_private");this.cache.set(T.fee_private.locator,[e.toBytes(),i.XV.feePrivateVerifier().toBytes()])}insertFeePublicKeys(e){if(!e.isFeePublicProver())throw new Error("Attempted to insert invalid proving keys for fee_public");this.cache.set(T.fee_public.locator,[e.toBytes(),i.XV.feePublicVerifier().toBytes()])}insertJoinKeys(e){if(!e.isJoinProver())throw new Error("Attempted to insert invalid proving keys for join");this.cache.set(T.join.locator,[e.toBytes(),i.XV.joinVerifier().toBytes()])}insertSetValidatorStateKeys(e){if(!e.isSetValidatorStateProver())throw new Error("Attempted to insert invalid proving keys for set_validator_state");this.cache.set(T.set_validator_state.locator,[e.toBytes(),i.XV.setValidatorStateVerifier().toBytes()])}insertSplitKeys(e){if(!e.isSplitProver())throw new Error("Attempted to insert invalid proving keys for split");this.cache.set(T.split.locator,[e.toBytes(),i.XV.splitVerifier().toBytes()])}insertTransferPrivateKeys(e){if(!e.isTransferPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_private");this.cache.set(T.transfer_private.locator,[e.toBytes(),i.XV.transferPrivateVerifier().toBytes()])}insertTransferPrivateToPublicKeys(e){if(!e.isTransferPrivateToPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_private_to_public");this.cache.set(T.transfer_private_to_public.locator,[e.toBytes(),i.XV.transferPrivateToPublicVerifier().toBytes()])}insertTransferPublicKeys(e){if(!e.isTransferPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_public");this.cache.set(T.transfer_public.locator,[e.toBytes(),i.XV.transferPublicVerifier().toBytes()])}insertTransferPublicToPrivateKeys(e){if(!e.isTransferPublicToPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_public_to_private");this.cache.set(T.transfer_public_to_private.locator,[e.toBytes(),i.XV.transferPublicToPrivateVerifier().toBytes()])}insertUnbondPublicKeys(e){if(!e.isUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for unbond_public");this.cache.set(T.unbond_public.locator,[e.toBytes(),i.XV.unbondPublicVerifier().toBytes()])}}class v{account;networkClient;constructor(e,t){this.account=e,this.networkClient=t}setAccount(e){this.account=e}async findCreditsRecords(e,t,r,n){let i=0,_=0;if(n&&("startHeight"in n&&"number"==typeof n.endHeight&&(i=n.startHeight),"endHeight"in n&&"number"==typeof n.endHeight&&(_=n.endHeight)),0==_){const e=await this.networkClient.getLatestHeight();if(e instanceof Error)throw l("Unable to get current block height from the network");_=e}if(i>=_)throw l("Start height must be less than end height");return await this.networkClient.findUnspentRecords(i,_,this.account.privateKey(),e,void 0,r)}async findCreditsRecord(e,t,r,n){const i=await this.findCreditsRecords([e],t,r,n);return!(i instanceof Error)&&i.length>0?i[0]:(console.error("Record not found with error:",i),new Error("Record not found"))}async findRecord(e,t,r){throw new Error("Method not implemented.")}async findRecords(e,t,r){throw new Error("Method not implemented.")}}class m{startHeight;endHeight;constructor(e,t){this.startHeight=e,this.endHeight=t}}let P=null;const k=()=>{if(!P){const e=new Worker(new URL(r.p+r.u(530),r.b),{type:void 0});P=(0,_.Ud)(e)}return P};class K{account;keyProvider;host;networkClient;recordProvider;constructor(e,t,r){this.host=e||"https://api.explorer.aleo.org/v1",this.networkClient=new w(this.host),this.keyProvider=t||new p,this.recordProvider=r}setAccount(e){this.account=e}setKeyProvider(e){this.keyProvider=e}setHost(e){this.host=e,this.networkClient.setHost(e)}setRecordProvider(e){this.recordProvider=e}async deploy(e,t,r,n,_,a){try{const t=i.$r.fromString(e);let r;try{r=await this.networkClient.getProgram(t.id())}catch(e){console.log(`Program ${t.id()} does not exist on the network, deploying...`)}if("string"==typeof r)throw`Program ${t.id()} already exists on the network, please rename your program`}catch(e){throw l(`Error validating program: ${e}`)}let o,s=a;if(void 0===a&&void 0!==this.account&&(s=this.account.privateKey()),void 0===s)throw"No private key provided and no private key set in the ProgramManager";try{_=r?await this.getCreditsRecord(t,[],_,n):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{o=r?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[c,d]=o;let g;try{g=await this.networkClient.getProgramImports(e)}catch(e){throw l(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}const u=await i.L.buildDeploymentTransaction(s,e,t,_,this.host,g,c,d);return await this.networkClient.submitTransaction(u)}async buildExecutionTransaction(e){const{programName:t,functionName:r,fee:n,privateFee:_,inputs:a,recordSearchParams:o,keySearchParams:s,privateKey:c,offlineQuery:d}=e;let g=e.feeRecord,u=e.provingKey,f=e.verifyingKey,w=e.program,b=e.imports;if(void 0===w)try{w=await this.networkClient.getProgram(t)}catch(e){throw l(`Error finding ${t}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`)}else w instanceof i.$r&&(w=w.toString());let p,y=c;if(void 0===c&&void 0!==this.account&&(y=this.account.privateKey()),void 0===y)throw"No private key provided and no private key set in the ProgramManager";try{g=_?await this.getCreditsRecord(n,[],g,o):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{p=_?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[h,v]=p;if(!u||!f)try{[u,f]=await this.keyProvider.functionKeys(s)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}if(i.$r.fromString(w).getImports().length>0&&!b)try{b=await this.networkClient.getProgramImports(t)}catch(e){throw l(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await i.L.buildExecutionTransaction(y,w,r,a,n,g,this.host,b,u,f,h,v,d)}async execute(e){const t=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(t)}async run(e,t,r,n,_,a,o,s,c,d){let g=c;if(void 0===c&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";if(!o||!s)try{[o,s]=await this.keyProvider.functionKeys(a)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",o),console.log("Verifying key: ",s),i.L.executeFunctionOffline(g,e,t,r,n,!1,_,o,s,this.host,d)}async join(e,t,r,n,_,a,o,s){let c,d,g=o;if(void 0===o&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";try{c=n?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),d=await this.keyProvider.joinKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[u,f]=c,[w,b]=d;try{a=n?await this.getCreditsRecord(r,[],a,_):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof i.PD?e:i.PD.fromString(e),t=t instanceof i.PD?t:i.PD.fromString(t)}catch(e){throw l("Records provided are not valid. Please ensure they are valid plaintext records.")}const p=await i.L.buildJoinTransaction(g,e,t,r,a,this.host,w,b,u,f,s);return await this.networkClient.submitTransaction(p)}async split(e,t,r,n){let _,a=r;if(void 0===a&&void 0!==this.account&&(a=this.account.privateKey()),void 0===a)throw"No private key provided and no private key set in the ProgramManager";try{_=await this.keyProvider.splitKeys()}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[o,s]=_;try{t=t instanceof i.PD?t:i.PD.fromString(t)}catch(e){throw l("Record provided is not valid. Please ensure it is a valid plaintext record.")}const c=await i.L.buildSplitTransaction(a,e,t,this.host,o,s,n);return await this.networkClient.submitTransaction(c)}async synthesizeKeys(e,t,r,n){let _,a=n;void 0===a&&(a=void 0!==this.account?this.account.privateKey():new i._q);try{_=await this.networkClient.getProgramImports(e);const n=await i.L.synthesizeKeyPair(a,e,t,r,_);return[n.provingKey(),n.verifyingKey()]}catch(e){throw l(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,t,r,n,_,a,o,s,g,u){r=d(r);let f,w,b=g;if(void 0===b&&void 0!==this.account&&(b=this.account.privateKey()),void 0===b)throw"No private key provided and no private key set in the ProgramManager";try{f=_?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),w=await this.keyProvider.transferKeys(r)}catch(e){throw l(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[p,y]=f,[h,v]=w;try{const e=[];c(r)?(o=await this.getCreditsRecord(n,[],o,a),e.push(o.nonce())):o=void 0,s=_?await this.getCreditsRecord(n,e,s,a):void 0}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await i.L.buildTransferTransaction(b,e,t,r,o,n,s,this.host,h,v,p,y,u)}async buildTransferPublicTransaction(e,t,r,n,i){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,i)}async buildTransferPublicAsSignerTransaction(e,t,r,n,i){return this.buildTransferTransaction(e,t,"public",r,!1,void 0,void 0,void 0,n,i)}async transfer(e,t,r,n,i,_,a,o,s,c){const d=await this.buildTransferTransaction(e,t,r,n,i,_,a,o,s,c);return await this.networkClient.submitTransaction(d)}async buildBondPublicTransaction(e,t,r,n,i={}){const _=Math.trunc(1e6*n),{programName:a="credits.aleo",functionName:o="bond_public",fee:s=i.fee||.86,privateFee:c=!1,inputs:d=[e,t,r,`${_.toString()}u64`],keySearchParams:g=new b({proverUri:T.bond_public.prover,verifierUri:T.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:l=this.creditsProgram(),...u}=i,f={programName:a,functionName:o,fee:s,privateFee:c,inputs:d,keySearchParams:g,...u};return await this.buildExecutionTransaction(f)}async bondPublic(e,t,r,n,i={}){const _=await this.buildBondPublicTransaction(e,t,r,n,i);return await this.networkClient.submitTransaction(_)}async buildBondValidatorTransaction(e,t,r,n,i={}){const _=Math.trunc(1e6*r),a=Math.trunc(n),{programName:o="credits.aleo",functionName:s="bond_validator",fee:c=i.fee||.86,privateFee:d=!1,inputs:g=[e,t,`${_.toString()}u64`,`${a.toString()}u8`],keySearchParams:l=new b({proverUri:T.bond_validator.prover,verifierUri:T.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:u=this.creditsProgram(),...f}=i,w={programName:o,functionName:s,fee:c,privateFee:d,inputs:g,keySearchParams:l,...f};return await this.buildExecutionTransaction(w)}async bondValidator(e,t,r,n,i={}){const _=await this.buildBondValidatorTransaction(e,t,r,n,i);return await this.networkClient.submitTransaction(_)}async buildUnbondPublicTransaction(e,t,r={}){const n=Math.trunc(1e6*t),{programName:i="credits.aleo",functionName:_="unbond_public",fee:a=r.fee||1.3,privateFee:o=!1,inputs:s=[e,`${n.toString()}u64`],keySearchParams:c=new b({proverUri:T.unbond_public.prover,verifierUri:T.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:d=this.creditsProgram(),...g}=r,l={programName:i,functionName:_,fee:a,privateFee:o,inputs:s,keySearchParams:c,...g};return this.buildExecutionTransaction(l)}async unbondPublic(e,t,r={}){const n=await this.buildUnbondPublicTransaction(e,t,r);return await this.networkClient.submitTransaction(n)}async buildClaimUnbondPublicTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="claim_unbond_public",fee:i=t.fee||2,privateFee:_=!1,inputs:a=[e],keySearchParams:o=new b({proverUri:T.claim_unbond_public.prover,verifierUri:T.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:s=this.creditsProgram(),...c}=t,d={programName:r,functionName:n,fee:i,privateFee:_,inputs:a,keySearchParams:o,...c};return await this.buildExecutionTransaction(d)}async claimUnbondPublic(e,t={}){const r=await this.buildClaimUnbondPublicTransaction(e,t);return await this.networkClient.submitTransaction(r)}async buildSetValidatorStateTransaction(e,t={}){const{programName:r="credits.aleo",functionName:n="set_validator_state",fee:i=1,privateFee:_=!1,inputs:a=[e.toString()],keySearchParams:o=new b({proverUri:T.set_validator_state.prover,verifierUri:T.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...s}=t,c={programName:r,functionName:n,fee:i,privateFee:_,inputs:a,keySearchParams:o,...s};return await this.execute(c)}async setValidatorState(e,t={}){const r=await this.buildSetValidatorStateTransaction(e,t);return this.networkClient.submitTransaction(r)}verifyExecution(e){try{const t=e.getExecution(),r=e.getFunctionId(),n=e.getProgram(),_=e.getVerifyingKey();return(0,i.hz)(t,_,n,r)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return i.$r.fromString(e)}creditsProgram(){return i.$r.getCreditsProgram()}verifyProgram(e){try{return i.$r.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,t,r,n){try{return r instanceof i.PD?r:i.PD.fromString(r)}catch(r){try{const r=this.recordProvider;return await r.findCreditsRecord(e,!0,t,n)}catch(e){throw l(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function c(e){return E.has(e)}function d(e){return V.has(e)?e:l(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const S=i.SF.baseUrl();function g(e){const t=i.XV[e.verifyingKey];if(!t)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:t}}const T={bond_public:g(i.SF.bond_public()),bond_validator:g(i.SF.bond_validator()),claim_unbond_public:g(i.SF.claim_unbond_public()),fee_private:g(i.SF.fee_private()),fee_public:g(i.SF.fee_public()),inclusion:g(i.SF.inclusion()),join:g(i.SF.join()),set_validator_state:g(i.SF.set_validator_state()),split:g(i.SF.split()),transfer_private:g(i.SF.transfer_private()),transfer_private_to_public:g(i.SF.transfer_private_to_public()),transfer_public:g(i.SF.transfer_public()),transfer_public_as_signer:g(i.SF.transfer_public_as_signer()),transfer_public_to_private:g(i.SF.transfer_public_to_private()),unbond_public:g(i.SF.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},E=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),V=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),R=new Set(["private","transfer_private","transferPrivate"]),F=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),x=new Set(["public","transfer_public","transferPublic"]),C=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),A=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function l(e){throw console.error(e),e}async function u(){console.warn("initializeWasm is deprecated, you no longer need to use it")}n()}catch(B){n(B)}}))},9933:(e,t,r)=>{r.a(e,(async(e,n)=>{try{function i(e,t,r,n){return new Promise((i=>{const _=new Worker(e,{type:"module"});_.addEventListener("message",(e=>{setTimeout((()=>{i(_),_.unref&&_.unref()}),0)}),{capture:!0,once:!0}),_.postMessage({module:t,memory:r,address:n})}))}let B;r.d(t,{$r:()=>Ie,CK:()=>A,Gd:()=>Be,IO:()=>We,L:()=>Me,PD:()=>$e,Pc:()=>De,SF:()=>Ae,XV:()=>qe,YW:()=>Le,_U:()=>xe,_q:()=>Oe,fW:()=>je,gN:()=>Ce,hz:()=>He,kL:()=>Re,o:()=>Fe,uq:()=>ze,zW:()=>Ne});const U=new Array(128).fill(void 0);function _(e){return U[e]}U.push(void 0,null,!0,!1);let O=U.length;function a(e){e<132||(U[e]=O,O=e)}function o(e){const t=_(e);return a(e),t}const z="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&z.decode();let I=null;function s(){return null!==I&&I.buffer===B.memory.buffer||(I=new Uint8Array(B.memory.buffer)),I}function c(e,t){return e>>>=0,z.decode(s().slice(e,e+t))}function d(e){O===U.length&&U.push(U.length+1);const t=O;return O=U[t],U[t]=e,t}let N=0;const j="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},$=function(e,t){const r=j.encode(e);return t.set(r),{read:e.length,written:r.length}};function g(e,t,r){if(void 0===r){const r=j.encode(e),n=t(r.length,1)>>>0;return s().subarray(n,n+r.length).set(r),N=r.length,n}let n=e.length,i=t(n,1)>>>0;const _=s();let a=0;for(;a127)break;_[i+a]=t}if(a!==n){0!==a&&(e=e.slice(a)),i=r(i,n,n=a+3*e.length,1)>>>0;const t=s().subarray(i+a,i+n);a+=$(e,t).written,i=r(i,n,a,1)>>>0}return N=a,i}function l(e){return null==e}let M=null;function u(){return null!==M&&M.buffer===B.memory.buffer||(M=new Int32Array(B.memory.buffer)),M}function f(e){const t=typeof e;if("number"==t||"boolean"==t||null==e)return`${e}`;if("string"==t)return`"${e}"`;if("symbol"==t){const t=e.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=e.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(e)){const t=e.length;let r="[";t>0&&(r+=f(e[0]));for(let n=1;n1))return toString.call(e);if(n=r[1],"Object"==n)try{return"Object("+JSON.stringify(e)+")"}catch(e){return"Object"}return e instanceof Error?`${e.name}: ${e.message}\n${e.stack}`:n}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>{B.__wbindgen_export_3.get(e.dtor)(e.a,e.b)}));function w(e,t,r,n){const i={a:e,b:t,cnt:1,dtor:r},_=(...e)=>{i.cnt++;const t=i.a;i.a=0;try{return n(t,i.b,...e)}finally{0==--i.cnt?(B.__wbindgen_export_3.get(i.dtor)(t,i.b),D.unregister(i)):i.a=t}};return _.original=i,D.register(_,i,i),_}function b(e,t,r){B._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(e,t,d(r))}function p(e,t){if(!(e instanceof t))throw new Error(`expected instance of ${t.name}`);return e.ptr}function y(e,t){const r=t(1*e.length,1)>>>0;return s().set(e,r/1),N=e.length,r}function h(e,t,r,n){try{const a=B.__wbindgen_add_to_stack_pointer(-16);p(e,X),p(t,Ke),p(r,de);const s=g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.verifyFunctionExecution(a,e.__wbg_ptr,t.__wbg_ptr,r.__wbg_ptr,s,c);var i=u()[a/4+0],_=u()[a/4+1];if(u()[a/4+2])throw o(_);return 0!==i}finally{B.__wbindgen_add_to_stack_pointer(16)}}let L=null;function v(){return null!==L&&L.buffer===B.memory.buffer||(L=new BigInt64Array(B.memory.buffer)),L}function m(e,t){return e>>>=0,s().subarray(e/1,e/1+t)}function P(e){B.runRayonThread(e)}function k(e,t){return o(B.initThreadPool(d(e),t))}function K(e,t){try{return e.apply(this,t)}catch(e){B.__wbindgen_exn_store(d(e))}}function S(e,t,r,n){B.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(e,t,d(r),d(n))}const W="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_address_free(e>>>0)));let q=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,W.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,W.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_address_free(e)}static from_private_key(t){p(t,ae);const r=B.address_from_private_key(t.__wbg_ptr);return e.__wrap(r)}static from_view_key(t){p(t,Te);const r=B.address_from_view_key(t.__wbg_ptr);return e.__wrap(r)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.address_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.address_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}verify(e,t){const r=y(e,B.__wbindgen_malloc),n=N;p(t,ve);return 0!==B.address_verify(this.__wbg_ptr,r,n,t.__wbg_ptr)}};const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_execution_free(e>>>0)));let X=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,H.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_execution_free(e)}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.execution_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.execution_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const J="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_executionresponse_free(e>>>0)));let Y=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,J.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,J.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_executionresponse_free(e)}getOutputs(){return o(B.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const e=B.executionresponse_getExecution(this.__wbg_ptr);return 0===e?void 0:X.__wrap(e)}getKeys(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.executionresponse_getKeys(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return ee.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const e=B.executionresponse_getProvingKey(this.__wbg_ptr);return 0===e?void 0:fe.__wrap(e)}getVerifyingKey(){const e=B.executionresponse_getVerifyingKey(this.__wbg_ptr);return Ke.__wrap(e)}getFunctionId(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}getProgram(){const e=B.executionresponse_getProgram(this.__wbg_ptr);return de.__wrap(e)}};const G="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_field_free(e>>>0)));let Q=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,G.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,G.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_field_free(e)}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.field_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.field_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_keypair_free(e>>>0)));class ee{static __wrap(e){e>>>=0;const t=Object.create(ee.prototype);return t.__wbg_ptr=e,Z.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_keypair_free(e)}constructor(e,t){p(e,fe);var r=e.__destroy_into_raw();p(t,Ke);var n=t.__destroy_into_raw();const i=B.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.keypair_provingKey(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return fe.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.keypair_verifyingKey(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return Ke.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}}const te="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_metadata_free(e>>>0)));let re=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,te.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,te.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_metadata_free(e)}get name(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_name(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set name(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_name(this.__wbg_ptr,t,r)}get locator(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set locator(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_locator(this.__wbg_ptr,t,r)}get prover(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set prover(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_prover(this.__wbg_ptr,t,r)}get verifier(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set verifier(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_verifier(this.__wbg_ptr,t,r)}get verifyingKey(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}set verifyingKey(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;B.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,r)}static baseUrl(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.metadata_baseUrl(i);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static bond_public(){const t=B.metadata_bond_public();return e.__wrap(t)}static bond_validator(){const t=B.metadata_bond_validator();return e.__wrap(t)}static claim_unbond_public(){const t=B.metadata_claim_unbond_public();return e.__wrap(t)}static fee_private(){const t=B.metadata_fee_private();return e.__wrap(t)}static fee_public(){const t=B.metadata_fee_public();return e.__wrap(t)}static inclusion(){const t=B.metadata_inclusion();return e.__wrap(t)}static join(){const t=B.metadata_join();return e.__wrap(t)}static set_validator_state(){const t=B.metadata_set_validator_state();return e.__wrap(t)}static split(){const t=B.metadata_split();return e.__wrap(t)}static transfer_private(){const t=B.metadata_transfer_private();return e.__wrap(t)}static transfer_private_to_public(){const t=B.metadata_transfer_private_to_public();return e.__wrap(t)}static transfer_public(){const t=B.metadata_transfer_public();return e.__wrap(t)}static transfer_public_as_signer(){const t=B.metadata_transfer_public_as_signer();return e.__wrap(t)}static transfer_public_to_private(){const t=B.metadata_transfer_public_to_private();return e.__wrap(t)}static unbond_public(){const t=B.metadata_unbond_public();return e.__wrap(t)}};const ne="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_offlinequery_free(e>>>0)));let ie=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ne.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ne.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_offlinequery_free(e)}constructor(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.offlinequery_new(n,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return this.__wbg_ptr=t>>>0,this}finally{B.__wbindgen_add_to_stack_pointer(16)}}addStatePath(e,t){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N,a=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.offlinequery_addStatePath(n,this.__wbg_ptr,i,_,a,s);var r=u()[n/4+0];if(u()[n/4+1])throw o(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.offlinequery_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.offlinequery_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const _e="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_privatekey_free(e>>>0)));let ae=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,_e.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,_e.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_privatekey_free(e)}constructor(){const e=B.privatekey_new();return this.__wbg_ptr=e>>>0,this}static from_seed_unchecked(t){const r=y(t,B.__wbindgen_malloc),n=N,i=B.privatekey_from_seed_unchecked(r,n);return e.__wrap(i)}static from_string(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.privatekey_from_string(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.privatekey_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}to_view_key(){const e=B.privatekey_to_view_key(this.__wbg_ptr);return Te.__wrap(e)}to_address(){const e=B.privatekey_to_address(this.__wbg_ptr);return q.__wrap(e)}sign(e){const t=y(e,B.__wbindgen_malloc),r=N,n=B.privatekey_sign(this.__wbg_ptr,t,r);return ve.__wrap(n)}static newEncrypted(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekey_newEncrypted(n,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return se.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekey_toCiphertext(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return se.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,r){try{const _=B.__wbindgen_add_to_stack_pointer(-16);p(t,se);const a=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.privatekey_fromPrivateKeyCiphertext(_,t.__wbg_ptr,a,s);var n=u()[_/4+0],i=u()[_/4+1];if(u()[_/4+2])throw o(i);return e.__wrap(n)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const oe="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_privatekeyciphertext_free(e>>>0)));let se=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,oe.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,oe.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_privatekeyciphertext_free(e)}static encryptPrivateKey(t,r){try{const _=B.__wbindgen_add_to_stack_pointer(-16);p(t,ae);const a=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),s=N;B.privatekey_toCiphertext(_,t.__wbg_ptr,a,s);var n=u()[_/4+0],i=u()[_/4+1];if(u()[_/4+2])throw o(i);return e.__wrap(n)}finally{B.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.privatekeyciphertext_decryptToPrivateKey(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return ae.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.privatekeyciphertext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}};const ce="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_program_free(e>>>0)));let de=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ce.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ce.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_program_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.program_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.program_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}hasFunction(e){const t=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;return 0!==B.program_hasFunction(this.__wbg_ptr,t,r)}getFunctions(){return o(B.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getFunctionInputs(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.program_getMappings(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return o(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getRecordMembers(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.program_getStructMembers(n,this.__wbg_ptr,i,_);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return o(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=B.program_getCreditsProgram();return e.__wrap(t)}id(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.program_id(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}address(){try{const r=B.__wbindgen_add_to_stack_pointer(-16);B.program_address(r,this.__wbg_ptr);var e=u()[r/4+0],t=u()[r/4+1];if(u()[r/4+2])throw o(t);return q.__wrap(e)}finally{B.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){p(t,e);return 0!==B.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return o(B.program_getImports(this.__wbg_ptr))}};const ge="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_programmanager_free(e>>>0)));let le=class{__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ge.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_programmanager_free(e)}static buildDeploymentTransaction(e,t,r,n,i,_,a,s,c){p(e,ae);const u=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),f=N;let w=0;l(n)||(p(n,ye),w=n.__destroy_into_raw());var b=l(i)?0:g(i,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N;let h=0;l(a)||(p(a,fe),h=a.__destroy_into_raw());let v=0;l(s)||(p(s,Ke),v=s.__destroy_into_raw());let m=0;l(c)||(p(c,ie),m=c.__destroy_into_raw());return o(B.programmanager_buildDeploymentTransaction(e.__wbg_ptr,u,f,r,w,b,y,l(_)?0:d(_),h,v,m))}static estimateDeploymentFee(e,t){const r=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;return o(B.programmanager_estimateDeploymentFee(r,n,l(t)?0:d(t)))}static estimateProgramNameCost(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16),i=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),_=N;B.programmanager_estimateProgramNameCost(n,i,_);var t=v()[n/8+0],r=u()[n/4+2];if(u()[n/4+3])throw o(r);return BigInt.asUintN(64,t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(e,t,r,n,i,_,a,s,c,u,f){p(e,ae);const w=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),b=N,y=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(s)||(p(s,fe),v=s.__destroy_into_raw());let m=0;l(c)||(p(c,Ke),m=c.__destroy_into_raw());var P=l(u)?0:g(u,B.__wbindgen_malloc,B.__wbindgen_realloc),k=N;let K=0;l(f)||(p(f,ie),K=f.__destroy_into_raw());return o(B.programmanager_executeFunctionOffline(e.__wbg_ptr,w,b,y,h,d(n),i,_,l(a)?0:d(a),v,m,P,k,K))}static buildExecutionTransaction(e,t,r,n,i,_,a,s,c,u,f,w,b){p(e,ae);const y=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N,v=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),m=N;let P=0;l(_)||(p(_,ye),P=_.__destroy_into_raw());var k=l(a)?0:g(a,B.__wbindgen_malloc,B.__wbindgen_realloc),K=N;let S=0;l(c)||(p(c,fe),S=c.__destroy_into_raw());let T=0;l(u)||(p(u,Ke),T=u.__destroy_into_raw());let E=0;l(f)||(p(f,fe),E=f.__destroy_into_raw());let V=0;l(w)||(p(w,Ke),V=w.__destroy_into_raw());let R=0;l(b)||(p(b,ie),R=b.__destroy_into_raw());return o(B.programmanager_buildExecutionTransaction(e.__wbg_ptr,y,h,v,m,d(n),i,P,k,K,l(s)?0:d(s),S,T,E,V,R))}static estimateExecutionFee(e,t,r,n,i,_,a,s,c){p(e,ae);const u=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),f=N,w=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),b=N;var y=l(i)?0:g(i,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(a)||(p(a,fe),v=a.__destroy_into_raw());let m=0;l(s)||(p(s,Ke),m=s.__destroy_into_raw());let P=0;l(c)||(p(c,ie),P=c.__destroy_into_raw());return o(B.programmanager_estimateExecutionFee(e.__wbg_ptr,u,f,w,b,d(n),y,h,l(_)?0:d(_),v,m,P))}static estimateFinalizeFee(e,t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.programmanager_estimateFinalizeFee(i,_,a,s,c);var r=v()[i/8+0],n=u()[i/4+2];if(u()[i/4+3])throw o(n);return BigInt.asUintN(64,r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(e,t,r,n,i,_,a,s,c,d,u){p(e,ae),p(t,ye);var f=t.__destroy_into_raw();p(r,ye);var w=r.__destroy_into_raw();let b=0;l(i)||(p(i,ye),b=i.__destroy_into_raw());var y=l(_)?0:g(_,B.__wbindgen_malloc,B.__wbindgen_realloc),h=N;let v=0;l(a)||(p(a,fe),v=a.__destroy_into_raw());let m=0;l(s)||(p(s,Ke),m=s.__destroy_into_raw());let P=0;l(c)||(p(c,fe),P=c.__destroy_into_raw());let k=0;l(d)||(p(d,Ke),k=d.__destroy_into_raw());let K=0;l(u)||(p(u,ie),K=u.__destroy_into_raw());return o(B.programmanager_buildJoinTransaction(e.__wbg_ptr,f,w,n,b,y,h,v,m,P,k,K))}static buildSplitTransaction(e,t,r,n,i,_,a){p(e,ae),p(r,ye);var s=r.__destroy_into_raw(),c=l(n)?0:g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),d=N;let u=0;l(i)||(p(i,fe),u=i.__destroy_into_raw());let f=0;l(_)||(p(_,Ke),f=_.__destroy_into_raw());let w=0;l(a)||(p(a,ie),w=a.__destroy_into_raw());return o(B.programmanager_buildSplitTransaction(e.__wbg_ptr,t,s,c,d,u,f,w))}static buildTransferTransaction(e,t,r,n,i,_,a,s,c,d,u,f,w){p(e,ae);const b=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N,h=g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),v=N;let m=0;l(i)||(p(i,ye),m=i.__destroy_into_raw());let P=0;l(a)||(p(a,ye),P=a.__destroy_into_raw());var k=l(s)?0:g(s,B.__wbindgen_malloc,B.__wbindgen_realloc),K=N;let S=0;l(c)||(p(c,fe),S=c.__destroy_into_raw());let T=0;l(d)||(p(d,Ke),T=d.__destroy_into_raw());let E=0;l(u)||(p(u,fe),E=u.__destroy_into_raw());let V=0;l(f)||(p(f,Ke),V=f.__destroy_into_raw());let R=0;l(w)||(p(w,ie),R=w.__destroy_into_raw());return o(B.programmanager_buildTransferTransaction(e.__wbg_ptr,t,b,y,h,v,m,_,P,k,K,S,T,E,V,R))}static synthesizeKeyPair(e,t,r,n,i){p(e,ae);const _=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;return o(B.programmanager_synthesizeKeyPair(e.__wbg_ptr,_,a,s,c,d(n),l(i)?0:d(i)))}};const ue="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_provingkey_free(e>>>0)));let fe=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ue.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ue.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_provingkey_free(e)}isBondPublicProver(){return 0!==B.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==B.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==B.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==B.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==B.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==B.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==B.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==B.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==B.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==B.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==B.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==B.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==B.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==B.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==B.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_checksum(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}copy(){const t=B.provingkey_copy(this.__wbg_ptr);return e.__wrap(t)}static fromBytes(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=y(t,B.__wbindgen_malloc),a=N;B.provingkey_fromBytes(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.provingkey_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_toBytes(i,this.__wbg_ptr);var e=u()[i/4+0],t=u()[i/4+1],r=u()[i/4+2];if(u()[i/4+3])throw o(r);var n=m(e,t).slice();return B.__wbindgen_free(e,1*t,1),n}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.provingkey_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const we="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_recordciphertext_free(e>>>0)));let be=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,we.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,we.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_recordciphertext_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.recordciphertext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordciphertext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}decrypt(e){try{const n=B.__wbindgen_add_to_stack_pointer(-16);p(e,Te),B.recordciphertext_decrypt(n,this.__wbg_ptr,e.__wbg_ptr);var t=u()[n/4+0],r=u()[n/4+1];if(u()[n/4+2])throw o(r);return ye.__wrap(t)}finally{B.__wbindgen_add_to_stack_pointer(16)}}isOwner(e){p(e,Te);return 0!==B.recordciphertext_isOwner(this.__wbg_ptr,e.__wbg_ptr)}};const pe="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_recordplaintext_free(e>>>0)));let ye=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,pe.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,pe.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_recordplaintext_free(e)}commitment(e,t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N,s=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),c=N;B.recordplaintext_commitment(i,this.__wbg_ptr,_,a,s,c);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return Q.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.recordplaintext_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordplaintext_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}microcredits(){const e=B.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,e)}nonce(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.recordplaintext_nonce(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}serialNumberString(e,t,r){let n,i;try{const w=B.__wbindgen_add_to_stack_pointer(-16);p(e,ae);const b=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),y=N,h=g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),v=N;B.recordplaintext_serialNumberString(w,this.__wbg_ptr,e.__wbg_ptr,b,y,h,v);var _=u()[w/4+0],a=u()[w/4+1],s=u()[w/4+2],d=u()[w/4+3],l=_,f=a;if(d)throw l=0,f=0,o(s);return n=l,i=f,c(l,f)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(n,i,1)}}};const he="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_signature_free(e>>>0)));let ve=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,he.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,he.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_signature_free(e)}static sign(t,r){p(t,ae);const n=y(r,B.__wbindgen_malloc),i=N,_=B.privatekey_sign(t.__wbg_ptr,n,i);return e.__wrap(_)}verify(e,t){p(e,q);const r=y(t,B.__wbindgen_malloc),n=N;return 0!==B.signature_verify(this.__wbg_ptr,e.__wbg_ptr,r,n)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.signature_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.signature_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const me="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_transaction_free(e>>>0)));let Pe=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,me.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,me.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_transaction_free(e)}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.transaction_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}transactionId(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_transactionId(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}transactionType(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.transaction_transactionType(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const ke="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_verifyingkey_free(e>>>0)));let Ke=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,ke.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,ke.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_verifyingkey_free(e)}static bondPublicVerifier(){const t=B.verifyingkey_bondPublicVerifier();return e.__wrap(t)}static bondValidatorVerifier(){const t=B.verifyingkey_bondValidatorVerifier();return e.__wrap(t)}static claimUnbondPublicVerifier(){const t=B.verifyingkey_claimUnbondPublicVerifier();return e.__wrap(t)}static feePrivateVerifier(){const t=B.verifyingkey_feePrivateVerifier();return e.__wrap(t)}static feePublicVerifier(){const t=B.verifyingkey_feePublicVerifier();return e.__wrap(t)}static inclusionVerifier(){const t=B.verifyingkey_inclusionVerifier();return e.__wrap(t)}static joinVerifier(){const t=B.verifyingkey_joinVerifier();return e.__wrap(t)}static setValidatorStateVerifier(){const t=B.verifyingkey_setValidatorStateVerifier();return e.__wrap(t)}static splitVerifier(){const t=B.verifyingkey_splitVerifier();return e.__wrap(t)}static transferPrivateVerifier(){const t=B.verifyingkey_transferPrivateVerifier();return e.__wrap(t)}static transferPrivateToPublicVerifier(){const t=B.verifyingkey_transferPrivateToPublicVerifier();return e.__wrap(t)}static transferPublicVerifier(){const t=B.verifyingkey_transferPublicVerifier();return e.__wrap(t)}static transferPublicAsSignerVerifier(){const t=B.verifyingkey_transferPublicAsSignerVerifier();return e.__wrap(t)}static transferPublicToPrivateVerifier(){const t=B.verifyingkey_transferPublicToPrivateVerifier();return e.__wrap(t)}static unbondPublicVerifier(){const t=B.verifyingkey_unbondPublicVerifier();return e.__wrap(t)}isBondPublicVerifier(){return 0!==B.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==B.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==B.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==B.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==B.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==B.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==B.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==B.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==B.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==B.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==B.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==B.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==B.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==B.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==B.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_checksum(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}copy(){const t=B.verifyingkey_copy(this.__wbg_ptr);return e.__wrap(t)}static fromBytes(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=y(t,B.__wbindgen_malloc),a=N;B.verifyingkey_fromBytes(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=B.__wbindgen_add_to_stack_pointer(-16),_=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;B.verifyingkey_fromString(i,_,a);var r=u()[i/4+0],n=u()[i/4+1];if(u()[i/4+2])throw o(n);return e.__wrap(r)}finally{B.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_toBytes(i,this.__wbg_ptr);var e=u()[i/4+0],t=u()[i/4+1],r=u()[i/4+2];if(u()[i/4+3])throw o(r);var n=m(e,t).slice();return B.__wbindgen_free(e,1*t,1),n}finally{B.__wbindgen_add_to_stack_pointer(16)}}toString(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.verifyingkey_toString(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}};const Se="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((e=>B.__wbg_viewkey_free(e>>>0)));let Te=class e{static __wrap(t){t>>>=0;const r=Object.create(e.prototype);return r.__wbg_ptr=t,Se.register(r,r.__wbg_ptr,r),r}__destroy_into_raw(){const e=this.__wbg_ptr;return this.__wbg_ptr=0,Se.unregister(this),e}free(){const e=this.__destroy_into_raw();B.__wbg_viewkey_free(e)}static from_private_key(t){p(t,ae);const r=B.privatekey_to_view_key(t.__wbg_ptr);return e.__wrap(r)}static from_string(t){const r=g(t,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N,i=B.viewkey_from_string(r,n);return e.__wrap(i)}to_string(){let e,t;try{const i=B.__wbindgen_add_to_stack_pointer(-16);B.viewkey_to_string(i,this.__wbg_ptr);var r=u()[i/4+0],n=u()[i/4+1];return e=r,t=n,c(r,n)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(e,t,1)}}to_address(){const e=B.address_from_view_key(this.__wbg_ptr);return q.__wrap(e)}decrypt(e){let t,r;try{const l=B.__wbindgen_add_to_stack_pointer(-16),f=g(e,B.__wbindgen_malloc,B.__wbindgen_realloc),w=N;B.viewkey_decrypt(l,this.__wbg_ptr,f,w);var n=u()[l/4+0],i=u()[l/4+1],_=u()[l/4+2],a=u()[l/4+3],s=n,d=i;if(a)throw s=0,d=0,o(_);return t=s,r=d,c(s,d)}finally{B.__wbindgen_add_to_stack_pointer(16),B.__wbindgen_free(t,r,1)}}};async function T(e,t){if("function"==typeof Response&&e instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(e,t)}catch(t){if("application/wasm"==e.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const r=await e.arrayBuffer();return await WebAssembly.instantiate(r,t)}{const r=await WebAssembly.instantiate(e,t);return r instanceof WebAssembly.Instance?{instance:r,module:e}:r}}function E(){const e={wbg:{}};return e.wbg.__wbindgen_object_drop_ref=function(e){o(e)},e.wbg.__wbg_new_71801a555ad9f2aa=function(){return K((function(){return d(new XMLHttpRequest)}),arguments)},e.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return K((function(e,t,r){_(e).overrideMimeType(c(t,r))}),arguments)},e.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return K((function(e,t,r,n,i,a){_(e).open(c(t,r),c(n,i),0!==a)}),arguments)},e.wbg.__wbg_send_80d29985093c1ec5=function(){return K((function(e){_(e).send()}),arguments)},e.wbg.__wbg_response_7c2e2759084f7279=function(){return K((function(e){return d(_(e).response)}),arguments)},e.wbg.__wbg_status_d485fb5a478426fb=function(){return K((function(e){return _(e).status}),arguments)},e.wbg.__wbg_new_72fb9a18b5ae2624=function(){return d(new Object)},e.wbg.__wbindgen_string_new=function(e,t){return d(c(e,t))},e.wbg.__wbg_set_1f9b04f170055d33=function(){return K((function(e,t,r){return Reflect.set(_(e),_(t),_(r))}),arguments)},e.wbg.__wbg_new_ab6fd82b10560829=function(){return K((function(){return d(new Headers)}),arguments)},e.wbg.__wbindgen_object_clone_ref=function(e){return d(_(e))},e.wbg.__wbg_new_0d76b0581eca6298=function(){return K((function(){return d(new AbortController)}),arguments)},e.wbg.__wbg_signal_a61f78a3478fd9bc=function(e){return d(_(e).signal)},e.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return K((function(e,t,r,n,i){_(e).append(c(t,r),c(n,i))}),arguments)},e.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(e){let t;try{t=_(e)instanceof Response}catch(e){t=!1}return t},e.wbg.__wbg_status_61a01141acd3cf74=function(e){return _(e).status},e.wbg.__wbg_url_5f6dc4009ac5f99d=function(e,t){const r=g(_(t).url,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbg_headers_9620bfada380764a=function(e){return d(_(e).headers)},e.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return d(Symbol.iterator)},e.wbg.__wbg_get_e3c254076557e348=function(){return K((function(e,t){return d(Reflect.get(_(e),_(t)))}),arguments)},e.wbg.__wbindgen_is_function=function(e){return"function"==typeof _(e)},e.wbg.__wbg_call_27c0f87801dedf93=function(){return K((function(e,t){return d(_(e).call(_(t)))}),arguments)},e.wbg.__wbindgen_is_object=function(e){const t=_(e);return"object"==typeof t&&null!==t},e.wbg.__wbg_next_40fc327bfc8770e6=function(e){return d(_(e).next)},e.wbg.__wbg_next_196c84450b364254=function(){return K((function(e){return d(_(e).next())}),arguments)},e.wbg.__wbg_done_298b57d23c0fc80c=function(e){return _(e).done},e.wbg.__wbg_value_d93c65011f51a456=function(e){return d(_(e).value)},e.wbg.__wbg_abort_2aa7521d5690750e=function(e){_(e).abort()},e.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return K((function(e){return d(JSON.stringify(_(e)))}),arguments)},e.wbg.__wbindgen_string_get=function(e,t){const r=_(t),n="string"==typeof r?r:void 0;var i=l(n)?0:g(n,B.__wbindgen_malloc,B.__wbindgen_realloc),a=N;u()[e/4+1]=a,u()[e/4+0]=i},e.wbg.__wbg_log_0159ca40cddf5b15=function(e,t){console.log(c(e,t))},e.wbg.__wbindgen_bigint_from_u64=function(e){return d(BigInt.asUintN(64,e))},e.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return K((function(e,t,r){return d(_(e).call(_(t),_(r)))}),arguments)},e.wbg.__wbg_transaction_new=function(e){return d(Pe.__wrap(e))},e.wbg.__wbg_keypair_new=function(e){return d(ee.__wrap(e))},e.wbg.__wbindgen_module=function(){return d(x.__wbindgen_wasm_module)},e.wbg.__wbindgen_memory=function(){return d(B.memory)},e.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(e,t,r,n){return d(i(_(e),_(t),_(r),n>>>0))},e.wbg.__wbg_executionresponse_new=function(e){return d(Y.__wrap(e))},e.wbg.__wbg_newwithlength_66ae46612e7f0234=function(e){return d(new Array(e>>>0))},e.wbg.__wbg_set_d4638f722068f043=function(e,t,r){_(e)[t>>>0]=o(r)},e.wbg.__wbindgen_cb_drop=function(e){const t=o(e).original;if(1==t.cnt--)return t.a=0,!0;return!1},e.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return d(new Array)},e.wbg.__wbg_push_a5b05aedc7234f9f=function(e,t){return _(e).push(_(t))},e.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return K((function(e){return d(_(e).arrayBuffer())}),arguments)},e.wbg.__wbg_new_63b92bc8671ed464=function(e){return d(new Uint8Array(_(e)))},e.wbg.__wbg_length_c20a40f15020d68a=function(e){return _(e).length},e.wbg.__wbg_new_81740750da40724f=function(e,t){try{var r={a:e,b:t};const n=new Promise(((e,t)=>{const n=r.a;r.a=0;try{return S(n,r.b,e,t)}finally{r.a=n}}));return d(n)}finally{r.a=r.b=0}},e.wbg.__wbindgen_number_new=function(e){return d(e)},e.wbg.__wbg_new_abda76e883ba8a5f=function(){return d(new Error)},e.wbg.__wbg_stack_658279fe44541cf6=function(e,t){const r=g(_(t).stack,B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbg_error_f851667af71bcfc6=function(e,t){let r,n;try{r=e,n=t,console.error(c(e,t))}finally{B.__wbindgen_free(r,n,1)}},e.wbg.__wbg_buffer_12d079cc21e14bdb=function(e){return d(_(e).buffer)},e.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(e,t,r){return d(new Uint8Array(_(e),t>>>0,r>>>0))},e.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return K((function(e,t){_(e).randomFillSync(o(t))}),arguments)},e.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(e,t,r){return d(_(e).subarray(t>>>0,r>>>0))},e.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return K((function(e,t){_(e).getRandomValues(_(t))}),arguments)},e.wbg.__wbg_set_a47bac70306a19a7=function(e,t,r){_(e).set(_(t),r>>>0)},e.wbg.__wbg_crypto_1d1f22824a6a080c=function(e){return d(_(e).crypto)},e.wbg.__wbg_process_4a72847cc503995b=function(e){return d(_(e).process)},e.wbg.__wbg_versions_f686565e586dd935=function(e){return d(_(e).versions)},e.wbg.__wbg_node_104a2ff8d6ea03a2=function(e){return d(_(e).node)},e.wbg.__wbindgen_is_string=function(e){return"string"==typeof _(e)},e.wbg.__wbg_require_cca90b1a94a0255b=function(){return K((function(){return d(module.require)}),arguments)},e.wbg.__wbg_msCrypto_eb05e62b530a1508=function(e){return d(_(e).msCrypto)},e.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(e){return d(new Uint8Array(e>>>0))},e.wbg.__wbg_length_cd7af8117672b8b8=function(e){return _(e).length},e.wbg.__wbg_get_bd8e338fbd5f5cc8=function(e,t){return d(_(e)[t>>>0])},e.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return K((function(){return d(self.self)}),arguments)},e.wbg.__wbg_window_c6fb939a7f436783=function(){return K((function(){return d(window.window)}),arguments)},e.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return K((function(){return d(globalThis.globalThis)}),arguments)},e.wbg.__wbg_global_207b558942527489=function(){return K((function(){return d(global.global)}),arguments)},e.wbg.__wbindgen_is_undefined=function(e){return void 0===_(e)},e.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(e,t){return d(new Function(c(e,t)))},e.wbg.__wbg_has_0af94d20077affa2=function(){return K((function(e,t){return Reflect.has(_(e),_(t))}),arguments)},e.wbg.__wbg_fetch_bc7c8e27076a5c84=function(e){return d(fetch(_(e)))},e.wbg.__wbg_fetch_921fad6ef9e883dd=function(e,t){return d(_(e).fetch(_(t)))},e.wbg.__wbindgen_debug_string=function(e,t){const r=g(f(_(t)),B.__wbindgen_malloc,B.__wbindgen_realloc),n=N;u()[e/4+1]=n,u()[e/4+0]=r},e.wbg.__wbindgen_throw=function(e,t){throw new Error(c(e,t))},e.wbg.__wbindgen_rethrow=function(e){throw o(e)},e.wbg.__wbg_then_a73caa9a87991566=function(e,t,r){return d(_(e).then(_(t),_(r)))},e.wbg.__wbg_then_0c86a60e8fcfe9f6=function(e,t){return d(_(e).then(_(t)))},e.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(e){queueMicrotask(_(e))},e.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(e){return d(_(e).queueMicrotask)},e.wbg.__wbg_resolve_b0083a7967828ec8=function(e){return d(Promise.resolve(_(e)))},e.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return d(Atomics.waitAsync)},e.wbg.__wbg_new_8cccba86b0f574cb=function(e){return d(new Int32Array(_(e)))},e.wbg.__wbg_waitAsync_46d5c36955b71a79=function(e,t,r){return d(Atomics.waitAsync(_(e),t,r))},e.wbg.__wbg_async_19c0400d97cc72fe=function(e){return _(e).async},e.wbg.__wbg_value_571d60108110e917=function(e){return d(_(e).value)},e.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(e){const t=g("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),B.__wbindgen_malloc,B.__wbindgen_realloc),r=N;u()[e/4+1]=r,u()[e/4+0]=t},e.wbg.__wbg_new_d1187ae36d662ef9=function(){return K((function(e,t){return d(new Worker(c(e,t)))}),arguments)},e.wbg.__wbg_setonmessage_503809e5bb51bd33=function(e,t){_(e).onmessage=_(t)},e.wbg.__wbg_of_6a70eed8d41f469c=function(e,t,r){return d(Array.of(_(e),_(t),_(r)))},e.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return K((function(e,t){_(e).postMessage(_(t))}),arguments)},e.wbg.__wbg_data_3ce7c145ca4fbcdc=function(e){return d(_(e).data)},e.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return K((function(e,t,r){return d(new Request(c(e,t),_(r)))}),arguments)},e.wbg.__wbg_responseText_c67ed2d48db10769=function(){return K((function(e,t){const r=_(t).responseText;var n=l(r)?0:g(r,B.__wbindgen_malloc,B.__wbindgen_realloc),i=N;u()[e/4+1]=i,u()[e/4+0]=n}),arguments)},e.wbg.__wbindgen_closure_wrapper5837=function(e,t,r){return d(w(e,t,538,b))},e.wbg.__wbindgen_closure_wrapper5862=function(e,t,r){return d(w(e,t,538,b))},e}function V(e,t){e.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(e,t){return B=e.exports,x.__wbindgen_wasm_module=t,L=null,M=null,I=null,B.__wbindgen_start(),B}function F(e,t){if(void 0!==B)return B;const r=E();V(r,t),e instanceof WebAssembly.Module||(e=new WebAssembly.Module(e));return R(new WebAssembly.Instance(e,r),e)}async function x(e,t){if(void 0!==B)return B;const r=E();("string"==typeof e||"function"==typeof Request&&e instanceof Request||"function"==typeof URL&&e instanceof URL)&&(e=fetch(e)),V(r,t);const{instance:n,module:i}=await T(await e,r);return R(n,i)}var C=Object.freeze({__proto__:null,Address:q,Execution:X,ExecutionResponse:Y,Field:Q,KeyPair:ee,Metadata:re,OfflineQuery:ie,PrivateKey:ae,PrivateKeyCiphertext:se,Program:de,ProgramManager:le,ProvingKey:fe,RecordCiphertext:be,RecordPlaintext:ye,Signature:ve,Transaction:Pe,VerifyingKey:Ke,ViewKey:Te,default:x,initSync:F,initThreadPool:k,runRayonThread:P,verifyFunctionExecution:h});const Ee="assets/aleo_wasm.wasm";const{initThreadPool:Ve,Address:Re,Execution:Fe,ExecutionResponse:xe,Field:Ce,Metadata:Ae,OfflineQuery:Be,Private:Ue,PrivateKey:Oe,PrivateKeyCiphertext:ze,Program:Ie,ProvingKey:Ne,RecordCiphertext:je,RecordPlaintext:$e,ProgramManager:Me,Signature:De,Transaction:Le,ViewKey:We,VerifyingKey:qe,verifyFunctionExecution:He}=await(async(e={})=>{let{importHook:t,serverPath:r,initializeHook:n}=e,i=Ee;return null!=r&&(i=r+/[^\/\\]*$/.exec(i)[0]),null!=t&&(i=t(i)),null!=n?await n(x,i):await x(i),C})({importHook:()=>new URL(r(5934),r.b)});async function A(e){null==e&&(e=navigator.hardwareConcurrency),console.info(`Spawning ${e} threads`),await Ve(new URL(r(2583),r.b),e)}n()}catch(Xe){n(Xe)}}),1)},6891:(e,t,r)=>{r.d(t,{Ud:()=>l});const n=Symbol("Comlink.proxy"),i=Symbol("Comlink.endpoint"),_=Symbol("Comlink.releaseProxy"),a=Symbol("Comlink.finalizer"),o=Symbol("Comlink.thrown"),s=e=>"object"==typeof e&&null!==e||"function"==typeof e,c=new Map([["proxy",{canHandle:e=>s(e)&&e[n],serialize(e){const{port1:t,port2:r}=new MessageChannel;return d(e,t),[r,[r]]},deserialize:e=>(e.start(),l(e))}],["throw",{canHandle:e=>s(e)&&o in e,serialize({value:e}){let t;return t=e instanceof Error?{isError:!0,value:{message:e.message,name:e.name,stack:e.stack}}:{isError:!1,value:e},[t,[]]},deserialize(e){if(e.isError)throw Object.assign(new Error(e.value.message),e.value);throw e.value}}]]);function d(e,t=globalThis,r=["*"]){t.addEventListener("message",(function i(_){if(!_||!_.data)return;if(!function(e,t){for(const r of e){if(t===r||"*"===r)return!0;if(r instanceof RegExp&&r.test(t))return!0}return!1}(r,_.origin))return void console.warn(`Invalid origin '${_.origin}' for comlink proxy`);const{id:s,type:c,path:l}=Object.assign({path:[]},_.data),u=(_.data.argumentList||[]).map(m);let f;try{const t=l.slice(0,-1).reduce(((e,t)=>e[t]),e),r=l.reduce(((e,t)=>e[t]),e);switch(c){case"GET":f=r;break;case"SET":t[l.slice(-1)[0]]=m(_.data.value),f=!0;break;case"APPLY":f=r.apply(t,u);break;case"CONSTRUCT":f=function(e){return Object.assign(e,{[n]:!0})}(new r(...u));break;case"ENDPOINT":{const{port1:t,port2:r}=new MessageChannel;d(e,r),f=function(e,t){return h.set(e,t),e}(t,[t])}break;case"RELEASE":f=void 0;break;default:return}}catch(e){f={value:e,[o]:0}}Promise.resolve(f).catch((e=>({value:e,[o]:0}))).then((r=>{const[n,_]=v(r);t.postMessage(Object.assign(Object.assign({},n),{id:s}),_),"RELEASE"===c&&(t.removeEventListener("message",i),g(t),a in e&&"function"==typeof e[a]&&e[a]())})).catch((e=>{const[r,n]=v({value:new TypeError("Unserializable return value"),[o]:0});t.postMessage(Object.assign(Object.assign({},r),{id:s}),n)}))})),t.start&&t.start()}function g(e){(function(e){return"MessagePort"===e.constructor.name})(e)&&e.close()}function l(e,t){return p(e,[],t)}function u(e){if(e)throw new Error("Proxy has been released and is not useable")}function f(e){return P(e,{type:"RELEASE"}).then((()=>{g(e)}))}const w=new WeakMap,b="FinalizationRegistry"in globalThis&&new FinalizationRegistry((e=>{const t=(w.get(e)||0)-1;w.set(e,t),0===t&&f(e)}));function p(e,t=[],r=function(){}){let n=!1;const a=new Proxy(r,{get(r,i){if(u(n),i===_)return()=>{!function(e){b&&b.unregister(e)}(a),f(e),n=!0};if("then"===i){if(0===t.length)return{then:()=>a};const r=P(e,{type:"GET",path:t.map((e=>e.toString()))}).then(m);return r.then.bind(r)}return p(e,[...t,i])},set(r,i,_){u(n);const[a,o]=v(_);return P(e,{type:"SET",path:[...t,i].map((e=>e.toString())),value:a},o).then(m)},apply(r,_,a){u(n);const o=t[t.length-1];if(o===i)return P(e,{type:"ENDPOINT"}).then(m);if("bind"===o)return p(e,t.slice(0,-1));const[s,c]=y(a);return P(e,{type:"APPLY",path:t.map((e=>e.toString())),argumentList:s},c).then(m)},construct(r,i){u(n);const[_,a]=y(i);return P(e,{type:"CONSTRUCT",path:t.map((e=>e.toString())),argumentList:_},a).then(m)}});return function(e,t){const r=(w.get(t)||0)+1;w.set(t,r),b&&b.register(e,t,e)}(a,e),a}function y(e){const t=e.map(v);return[t.map((e=>e[0])),(r=t.map((e=>e[1])),Array.prototype.concat.apply([],r))];var r}const h=new WeakMap;function v(e){for(const[t,r]of c)if(r.canHandle(e)){const[n,i]=r.serialize(e);return[{type:"HANDLER",name:t,value:n},i]}return[{type:"RAW",value:e},h.get(e)||[]]}function m(e){switch(e.type){case"HANDLER":return c.get(e.name).deserialize(e.value);case"RAW":return e.value}}function P(e,t,r){return new Promise((n=>{const i=new Array(4).fill(0).map((()=>Math.floor(Math.random()*Number.MAX_SAFE_INTEGER).toString(16))).join("-");e.addEventListener("message",(function t(r){r.data&&r.data.id&&r.data.id===i&&(e.removeEventListener("message",t),n(r.data))})),e.start&&e.start(),e.postMessage(Object.assign({id:i},t),r)}))}}}]); //# sourceMappingURL=52.bundle.js.map \ No newline at end of file diff --git a/52.bundle.js.map b/52.bundle.js.map index 2bb2569e3..03a99f3c7 100644 --- a/52.bundle.js.map +++ b/52.bundle.js.map @@ -1 +1 @@ -{"version":3,"file":"52.bundle.js","mappings":";0tCA2CaA,EACXC,YACAC,SACAC,SAEAC,WAAAA,CAAYC,EAAuB,CAAC,GAClC,IACEC,KAAKL,YAAcK,KAAKC,qBAAqBF,EAC9C,CAAC,MAAOG,GAEP,MADAC,QAAQC,MAAM,kBAAmBF,GAC3B,IAAIG,MAAM,kBACjB,CACDL,KAAKJ,SAAWU,EAAAA,GAAQC,iBAAiBP,KAAKL,aAC9CK,KAAKH,SAAWW,EAAAA,GAAQD,iBAAiBP,KAAKL,aAazC,qBAAOc,CAAeC,EAA2CC,GACtE,IACED,EAAoC,iBAAfA,EAA2BE,EAAAA,GAAqBC,WAAWH,GAAcA,EAC9F,MAAMf,EAAcmB,EAAAA,GAAWC,yBAAyBL,EAAYC,GACpE,OAAO,IAAIjB,EAAQ,CAAEsB,WAAYrB,EAAYsB,aAC9C,CAAC,MAAMf,GACN,MAAM,IAAIG,MAAM,uCACjB,EAGKJ,oBAAAA,CAAqBF,GAC3B,OAAIA,EAAOmB,KACFJ,EAAAA,GAAWK,oBAAoBpB,EAAOmB,MAE3CnB,EAAOiB,WACFF,EAAAA,GAAWM,YAAYrB,EAAOiB,YAEhC,IAAIF,EAAAA,GAGbE,UAAAA,GACE,OAAOhB,KAAKL,YAGd0B,OAAAA,GACE,OAAOrB,KAAKJ,SAGd0B,OAAAA,GACE,OAAOtB,KAAKH,SAGd0B,QAAAA,GACE,OAAOvB,KAAKsB,UAAUL,YAYxBO,cAAAA,CAAeb,GACb,OAAOX,KAAKL,YAAY8B,aAAad,GAYvCe,aAAAA,CAAchB,GACZ,OAAOV,KAAKJ,SAAS+B,QAAQjB,GAY/BkB,cAAAA,CAAeC,GACb,OAAOA,EAAYC,KAAKpB,GAAeV,KAAKJ,SAAS+B,QAAQjB,KAyB/DqB,oBAAAA,CAAqBrB,GACnB,GAA0B,iBAAfA,EAUT,OAAOA,EAAWsB,QAAQhC,KAAKJ,UAT/B,IAEE,OADyBqC,EAAAA,GAAiBpB,WAAWH,GAC7BsB,QAAQhC,KAAKJ,SACtC,CACD,MAAOM,GACL,OAAO,CACR,EAmBLgC,IAAAA,CAAKC,GACH,OAAOnC,KAAKL,YAAYuC,KAAKC,GAgB/BC,MAAAA,CAAOD,EAAqBE,GAC1B,OAAOrC,KAAKH,SAASuC,OAAOD,EAASE,ICnNlCC,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIvC,MAAMqC,EAASG,OAAS,sBAAwBL,GAG9D,OAAOE,CACX,CAGOJ,eAAeQ,EAAKN,EAAmBC,GAC1CA,EAAQM,OAAS,OAEjB,MAAML,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIvC,MAAMqC,EAASG,OAAS,uBAAyBL,GAG/D,OAAOE,CACX,CCUA,MAAMM,EACJC,KACAC,QACAC,QAEArD,WAAAA,CAAYmD,EAAcR,GACxBzC,KAAKiD,KAAOA,EAAO,WAEfR,GAAWA,EAAQS,QACrBlD,KAAKkD,QAAUT,EAAQS,QAGvBlD,KAAKkD,QAAU,CAEb,qBAAsB,UAa5BE,UAAAA,CAAWD,GACTnD,KAAKmD,QAAUA,EASjBE,UAAAA,GACE,OAAOrD,KAAKmD,QASdG,OAAAA,CAAQL,GACNjD,KAAKiD,KAAOA,EAAO,WAGrB,eAAMM,CACFf,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIvC,KAAKiD,KAAOT,EAAK,CAC1CU,QAASlD,KAAKkD,UAGhB,aAAaR,EAASc,MACrB,CAAC,MAAOpD,GACP,MAAM,IAAIC,MAAM,uBACjB,EA0BH,wBAAMoD,CACFC,EACAC,EACA3C,EACA4C,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfJ,EAAc,EAChB,MAAM,IAAIrD,MAAM,mDAIlB,MAAM0D,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfvD,EAA4B,CACrC,QAA4B,IAAjBhB,KAAKmD,QACd,MAAM,IAAI9C,MAAM,oGAEhB8D,EAAqBnE,KAAKmD,QAAQxD,WAErC,MACC,IACEwE,EAAqBnD,aAAsBF,EAAAA,GAAaE,EAAaF,EAAAA,GAAWM,YAAYJ,EAC7F,CAAC,MAAOZ,GACP,MAAM,IAAIC,MAAM,sCACjB,CAEH,MAAMgB,EAAU8C,EAAmBK,cAGnC,IACE,MAAMC,QAAoBzE,KAAK0E,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIpE,MAAM,uCAFhB+D,EAAeK,CAIlB,CAAC,MAAOrE,GACP,MAAM,IAAIC,MAAM,sCACjB,CAUD,GANE6D,EADuB,iBAAdP,GAA0BA,GAAaS,EAC1CT,EAEAS,EAIJV,EAAcQ,EAChB,MAAM,IAAI7D,MAAM,0DAIlB,KAAO6D,EAAMR,GAAa,CACxBO,EAAQC,EAAM,GACVD,EAAQP,IACVO,EAAQP,GAEV,IAEE,MAAMiB,QAAe3E,KAAK4E,cAAcX,EAAOC,GAE/C,GADAA,EAAMD,IACAU,aAAkBtE,OAEtB,IAAK,IAAIwE,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAAS3D,EAAAA,GAAiBpB,WAAW8E,EAAOE,OAElD,GAAID,EAAO5D,QAAQX,GAAU,CAE3B,MAAMyE,EAAkBF,EAAOjE,QAAQN,GAGjC0E,EAAQD,EAAgBC,QAC9B,GAAIjC,EAAOkC,SAASD,GAClB,SAIF,MAAME,EAAeH,EAAgBI,mBAAmB/B,EAAoB,eAAgB,WAE5F,UACQnE,KAAKmG,gBAAgBF,EAC5B,CAAC,MAAO7F,GAEP,IAAKwD,IACHG,EAAQqC,KAAKN,GAEkB,iBAApBjC,IACTS,GAAoBwB,EAAgBO,eAEhC/B,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQkB,OAAS,EAAG,CAC3D,IAAIwB,EAAgB,EACpB,GAAIR,EAAgBO,eAAiBzC,EAAQ0C,GAAgB,CAIzD,GAHAA,GAAiB,EACjBvC,EAAQqC,KAAKN,GAEkB,iBAApBjC,IACTS,GAAoBwB,EAAgBO,eAEhC/B,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQe,QAAUlB,EAAQkB,OAC5B,OAAOf,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAO3D,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHAD,QAAQoG,KAAK,mCAAqCtC,EAAM1C,WAAa,IAAM2C,EAAI3C,YAC/EpB,QAAQoG,KAAK,UAAWnG,GACxBiE,GAAY,EACRA,EAAW,GAEb,OADAlE,QAAQoG,KAAK,0EACNxC,CAEV,CACF,CACD,OAAOA,EAUT,cAAMyC,CAASC,GACb,IAEE,aADoBzG,KAAKuD,UAAiB,UAAYkD,EAEvD,CAAC,MAAOrG,GACP,MAAM,IAAIC,MAAM,wBACjB,EAWH,mBAAMuE,CAAcX,EAAeC,GACjC,IACE,aAAalE,KAAKuD,UAAwB,iBAAmBU,EAAQ,QAAUC,EAChF,CAAC,MAAO9D,GAEP,MAAM,IAAIC,MADW,iCAAmC4D,EAAQ,QAAUC,EAAM,IAEjF,EASH,0CAAMwC,CAAqClB,GACrCA,aAAmBmB,EAAAA,KACrBnB,EAAUA,EAAQjE,YAEpB,IAEE,aADiBvB,KAAKuD,UAAkB,kCAAoCiC,IAClEoB,QAAQ,IAAM,GACzB,CAAC,MAAOxG,GACP,MAAM,IAAIC,MAAM,qDACjB,EASH,wCAAMwG,CAAmCrB,GACvC,IACE,MAAMsB,QAA+B9G,KAAK0G,qCAAqClB,GAC/E,aAA+BxF,KAAK+G,eAAeD,EACpD,CAAC,MAAO1G,GACP,MAAM,IAAIC,MAAM,qDACjB,EASH,oBAAM2G,GACJ,IACE,aAAahH,KAAKuD,UAAiB,gBACpC,CAAC,MAAOnD,GACP,MAAM,IAAIC,MAAM,+BACjB,EAQH,wBAAM4G,GACJ,IACE,aAAajH,KAAKuD,UAAkB,oBACrC,CAAC,MAAOnD,GACP,MAAM,IAAIC,MAAM,+BACjB,EASH,qBAAMqE,GACJ,IACE,aAAa1E,KAAKuD,UAAkB,iBACrC,CAAC,MAAOnD,GACP,MAAM,IAAIC,MAAM,gCACjB,EAcH,gBAAM6G,CAAWC,GACf,IACE,aAAanH,KAAKuD,UAAkB,YAAc4D,EACnD,CAAC,MAAO/G,GACP,MAAM,IAAIC,MAAM,yBACjB,EAoBH,sBAAM+G,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQ9F,WAAWwG,EAC3B,CAAC,MAAOjH,GACP,IACE,OAAOuG,EAAAA,GAAQ9F,iBAA0Bb,KAAKkH,WAAWG,GAC1D,CAAC,MAAOjH,GACP,MAAM,IAAIC,MAAM,GAAGgH,iDACpB,CACF,EA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+BrH,KAAKoH,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAI5C,EAAI,EAAGA,EAAI2C,EAAW1C,OAAQD,IAAK,CAC1C,MAAM6C,EAAYF,EAAW3C,GAC7B,IAAK0C,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8B5H,KAAKkH,WAAWQ,GAC9CG,QAAsC7H,KAAKsH,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAOnH,GACP,MAAM2H,EAAY,mCAAqC3H,EACxD,EAcH,2BAAM4H,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+BrH,KAAKoH,iBAAiBC,IACxFI,YAChB,CAAC,MAAOrH,GACP,MAAM,IAAIC,MAAM,8CAAgDD,EACjE,EAYH,4BAAM6H,CAAuBd,GAC3B,IACE,aAAanH,KAAKuD,UAAyB,YAAc4D,EAAY,YACtE,CAAC,MAAO/G,GACP,MAAM,IAAIC,MAAM,2FACjB,EAiBH,4BAAM6H,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAa9H,KAAKuD,UAAkB,YAAc4D,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAO1H,GACP,MAAM,IAAIC,MAAM,kFACjB,EASH,kBAAM+H,GACJ,IACE,aAAapI,KAAKuD,UAAkB,oBACrC,CAAC,MAAOnD,GACP,MAAM,IAAIC,MAAM,iCACjB,EAUH,oBAAM0G,CAAesB,GACnB,IACA,aAAarI,KAAKuD,UAA4B,gBAAkB8E,EAC/D,CAAC,MAAOjI,GACP,MAAM,IAAIC,MAAM,8BACjB,EAUH,qBAAMiI,CAAgB7B,GACpB,IACA,aAAazG,KAAKuD,UAAmC,UAAYkD,EAAOlF,WAAa,gBACpF,CAAC,MAAOnB,GACP,MAAM,IAAIC,MAAM,+BACjB,EASH,8BAAMkI,GACJ,IACE,aAAavI,KAAKuD,UAAmC,2BACtD,CAAC,MAAOnD,GACP,MAAM,IAAIC,MAAM,4CACjB,EAUH,qBAAM8F,CAAgBqC,GACpB,IACE,aAAaxI,KAAKuD,UAAkB,sBAAwBiF,EAC7D,CAAC,MAAOpI,GACP,MAAM,IAAIC,MAAM,gCACjB,EASH,uBAAMoI,CAAkBtD,GACtB,MAAMuD,EAAqBvD,aAAuBwD,EAAAA,GAAcxD,EAAY5D,WAAa4D,EACzF,IACE,MAAMzC,QAAiBI,EAAK9C,KAAKiD,KAAO,yBAA0B,CAChE2F,KAAMF,EACNxF,QAAS2F,OAAOC,OAAO,CAAC,EAAG9I,KAAKkD,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaR,EAASc,MAEvB,CAAC,MAAOpD,GACP,MAAM,IAAIC,MAAM,qDAAsDD,EAAgB+B,UACvF,CACF,CAAC,MAAO/B,GACP,MAAM,IAAIC,MAAM,oDAAqDD,EAAgB+B,UACtF,GCjnBL,MAAM4G,EACFC,KACAC,UACAC,YACAC,SAUArJ,WAAAA,CAAYC,GACRC,KAAKiJ,UAAYlJ,EAAOkJ,UACxBjJ,KAAKkJ,YAAcnJ,EAAOmJ,YAC1BlJ,KAAKmJ,SAAWpJ,EAAOoJ,SACvBnJ,KAAKgJ,KAAOjJ,EAAOiJ,MAyK3B,MAAMI,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFhH,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBiH,QAAa/G,EAASgH,cAC5B,OAAO,IAAIC,WAAWF,EACrB,CAAC,MAAOrJ,GACL,MAAM,IAAIC,MAAM,uBAAyBD,EAC5C,EAGLN,WAAAA,GACIE,KAAKuJ,QAAUK,EACf5J,KAAKqJ,MAAQ,IAAIQ,IACjB7J,KAAKsJ,aAAc,EAQvBQ,QAAAA,CAASA,GACL9J,KAAKsJ,YAAcQ,EAMvBC,UAAAA,GACI/J,KAAKqJ,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnCnK,KAAKqJ,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAOlK,KAAKqJ,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAOlK,KAAKqJ,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/J,QAAQ0K,MAAM,2CAA2CX,KACrDlK,KAAKqJ,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC/K,KAAKqJ,MAAM9G,IAAI2H,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAI1K,MAAM,2BAwBzB,kBAAM8K,CAAapL,GACf,GAAIA,EAAQ,CACR,IAAIqL,EACAC,EACAlC,EACJ,GAAI,SAAUpJ,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAI+H,EAAMwD,EAAqBC,OAAOxL,EAAa,MACnD,KAAM+H,aAAezH,OACjB,OAAOL,KAAKwL,iBAAiB1D,EAEpC,CAcD,GAZI,cAAe/H,GAAwC,iBAAvBA,EAAkB,YAClDqL,EAAYrL,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDsL,EAActL,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDoJ,EAAWpJ,EAAiB,UAG5BqL,GAAaC,EACb,aAAarL,KAAKyL,gBAAgBL,EAAWC,EAAalC,GAG9D,GAAIA,EACA,OAAOnJ,KAAK4K,QAAQzB,EAE3B,CACD,MAAM9I,MAAM,oGA4BhB,qBAAMoL,CAAgBL,EAAmBC,EAAqBlC,GAC1D,IAEI,GAAInJ,KAAKsJ,YAAa,CACbH,IACDA,EAAWiC,GAEf,MAAMvF,EAAQ7F,KAAKqJ,MAAM9G,IAAI4G,GAC7B,QAAqB,IAAVtD,EACP,MAAO,CAACmF,EAAAA,GAAWC,UAAUpF,EAAM,IAAKqF,EAAAA,GAAaD,UAAUpF,EAAM,KAClE,CACH1F,QAAQ0K,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAC1EjL,QAAQ0K,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoCrK,KAAK0L,gBAAgBL,GAE/D,OADArL,KAAKqJ,MAAMiB,IAAInB,EAAU,CAACiB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAE1E,MAAO,CAAChB,QADkCpK,KAAK0L,gBAAgBL,GAElE,CACJ,CAAC,MAAOjL,GACL,MAAM,IAAIC,MAAgB,UAAAD,kDAAsDgL,SAAiBC,KACpG,EAWL,qBAAMM,CAAgBP,EAAmBjC,GACrC,IAEI,GAAInJ,KAAKsJ,YAAa,CACbH,IACDA,EAAWiC,GAEf,MAAMvF,EAAQ7F,KAAKqJ,MAAM9G,IAAI4G,GAC7B,QAAqB,IAAVtD,EACP,OAAOmF,EAAAA,GAAWC,UAAUpF,EAAM,IAElC1F,QAAQ0K,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,GAGjF,CAAC,MAAOhL,GACL,MAAM,IAAIC,MAAM,UAAUD,oCAAwCgL,IACrE,EAGL,sBAAMI,CAAiB1D,GACnB,IACI,GAAK9H,KAAKqJ,MAAMoB,IAAI3C,EAAI8D,UAAa5L,KAAKsJ,YAOnC,CACH,MAAMuC,EAAyB7L,KAAKqJ,MAAM9G,IAAIuF,EAAI8D,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgBhE,EAAIuC,eACpB0B,QAAgC/L,KAAK2L,gBAAgB7D,EAAIkE,OAAQlE,EAAI8D,SAI3E,OAHI5L,KAAKsJ,aACLtJ,KAAKqJ,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAO1L,GACL,MAAM,IAAIC,MAAM,sCAAsCD,IACzD,EAGL,oBAAM8L,GACF,OAAOlM,KAAKwL,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAOnM,KAAKwL,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOrM,KAAKwL,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAaxM,KAAKwL,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAaxM,KAAKwL,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAaxM,KAAKwL,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAaxM,KAAKwL,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAaxM,KAAKwL,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAI7M,MAAM,2BASxB,cAAM8M,GACF,aAAanN,KAAKwL,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAarN,KAAKwL,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAavN,KAAKwL,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAazN,KAAKwL,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBxC,GAClB,OAAQA,GACJ,KAAKoC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM3H,QAAiBH,EAAI2G,GACrB6E,QAAarL,EAASqL,OAC5B,OAAqB7C,EAAAA,GAAarK,WAAWkN,EAChD,CAAC,MAAO7N,GAEL,IACA,OAAqBgL,EAAAA,GAAaD,gBAAgBjL,KAAKwJ,WAAWN,GACjE,CAAC,MAAO8E,GACL,OAAO,IAAI3N,MAAM,iCAAmC2N,EACvD,CACJ,GAIbC,gBAAAA,GACI,OAAOjO,KAAKwL,iBAAiBF,EAAqBwC,gBCrkB1D,MAAMI,EACF/E,SACAgF,kBAUArO,WAAAA,CAAYqJ,EAAkBgF,GAAoB,GAC9CnO,KAAKmJ,SAAWA,EAChBnJ,KAAKmO,kBAAoBA,EAM7B,0BAAOC,GACH,OAAO,IAAIF,EAAoB5C,EAAqBW,YAAYL,SAAS,GAM7E,6BAAOyC,GACH,OAAO,IAAIH,EAAoB5C,EAAqBc,eAAeR,SAAS,GAMhF,iCAAO0C,GACH,OAAO,IAAIJ,EAAoB5C,EAAqBgB,oBAAoBV,SAAS,GAMrF,0BAAO2C,GACH,OAAO,IAAIL,EAAoB5C,EAAqBkC,YAAY5B,SAAS,GAM7E,yBAAO4C,GACH,OAAO,IAAIN,EAAoB5C,EAAqBoC,WAAW9B,SAAS,GAM5E,yBAAO6C,GACH,OAAO,IAAIP,EAAoB5C,EAAqBsC,UAAUhC,SAAS,GAM3E,oBAAO8C,GACH,OAAO,IAAIR,EAAoB5C,EAAqB8B,KAAKxB,SAAS,GAMtE,iCAAO+C,GACH,OAAO,IAAIT,EAAoB5C,EAAqBuC,oBAAoBjC,SAAS,GAMrF,qBAAOgD,GACH,OAAO,IAAIV,EAAoB5C,EAAqBgC,MAAM1B,SAAS,GAMvE,+BAAOiD,GACH,OAAO,IAAIX,EAAoB5C,EAAqBoB,iBAAiBd,SAAS,GAMlF,uCAAOkD,GACH,OAAO,IAAIZ,EAAoB5C,EAAqBsB,2BAA2BhB,SAAS,GAM5F,8BAAOmD,GACH,OAAO,IAAIb,EAAoB5C,EAAqBwB,gBAAgBlB,SAAS,GAMjF,sCAAOoD,GACH,OAAO,IAAId,EAAoB5C,EAAqB0B,0BAA0BpB,SAAS,GAM3F,uCAAOqD,GACH,OAAO,IAAIf,EAAoB5C,EAAqB4B,2BAA2BtB,SAAS,GAM5F,4BAAOsD,GACH,OAAO,IAAIhB,EAAoB5C,EAAqBwC,cAAclC,SAAS,IAuDnF,MAAMuD,EACF9F,MAEAvJ,WAAAA,GACIE,KAAKqJ,MAAQ,IAAIQ,IASrBqC,cAAAA,GACI,OAAOlM,KAAKmL,aAAa+C,EAAoBE,uBASjDjC,iBAAAA,GACI,OAAOnM,KAAKmL,aAAa+C,EAAoBG,0BAWjDpE,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnCnK,KAAKqJ,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9D8B,qBAAAA,GACI,OAAOrM,KAAKmL,aAAa+C,EAAoBI,8BA2BjDnD,YAAAA,CAAapL,GACT,OAAO,IAAIqP,SAAQ,CAACC,EAASC,KACzB,QAAeC,IAAXxP,EACAuP,EAAO,IAAIjP,MAAM,4DACd,CACH,MAAM6J,EAAQnK,EAAOoJ,SACfgF,EAAoBpO,EAAOoO,kBACjC,GAAInO,KAAKqJ,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAqB/K,KAAKqJ,MAAM9G,IAAI2H,GACtDE,EAAaY,EAAAA,GAAWC,UAAUH,GAClCT,EAAea,EAAAA,GAAaD,UAAUF,GAC5C,GAAIoD,EAAmB,CACOnO,KAAKmO,kBAAkBjE,EAAOE,EAAYC,IAEhEiF,EAAQ,IAAIjP,MAAM,8CAA8C6J,KAEvE,CACDmF,EAAQ,CAACjF,EAAYC,GACxB,MACGiF,EAAO,IAAIjP,MAAM,+BAAiC6J,GAEzD,KASTiE,iBAAAA,CAAkBvC,EAAiBxB,EAAwBC,GACvD,OAAQuB,GACJ,KAAKN,EAAqBW,YAAYL,QAClC,OAAOxB,EAAWoF,sBAAwBnF,EAAaoF,uBAC3D,KAAKnE,EAAqBgB,oBAAoBV,QAC1C,OAAOxB,EAAWsF,6BAA+BrF,EAAasF,8BAClE,KAAKrE,EAAqBkC,YAAY5B,QAClC,OAAOxB,EAAWwF,sBAAwBvF,EAAawF,uBAC3D,KAAKvE,EAAqBoC,WAAW9B,QACjC,OAAOxB,EAAW0F,qBAAuBzF,EAAa0F,sBAC1D,KAAKzE,EAAqBsC,UAAUhC,QAChC,OAAOxB,EAAW4F,qBAAuB3F,EAAa4F,sBAC1D,KAAK3E,EAAqB8B,KAAKxB,QAC3B,OAAOxB,EAAW8F,gBAAkB7F,EAAa8F,iBACrD,KAAK7E,EAAqBuC,oBAAoBjC,QAC1C,OAAOxB,EAAWgG,6BAA+B/F,EAAagG,8BAClE,KAAK/E,EAAqBgC,MAAM1B,QAC5B,OAAOxB,EAAWkG,iBAAmBjG,EAAakG,kBACtD,KAAKjF,EAAqBoB,iBAAiBd,QACvC,OAAOxB,EAAWoG,2BAA6BnG,EAAaoG,4BAChE,KAAKnF,EAAqBsB,2BAA2BhB,QACjD,OAAOxB,EAAWsG,mCAAqCrG,EAAasG,oCACxE,KAAKrF,EAAqBwB,gBAAgBlB,QACtC,OAAOxB,EAAWwG,0BAA4BvG,EAAawG,2BAC/D,KAAKvF,EAAqB4B,2BAA2BtB,QACjD,OAAOxB,EAAW0G,mCAAqCzG,EAAa0G,oCACxE,KAAKzF,EAAqBwC,cAAclC,QACpC,OAAOxB,EAAW4G,wBAA0B3G,EAAa4G,yBAC7D,QACI,OAAO,GAUnB1D,cAAAA,GACI,OAAOvN,KAAKmL,aAAa+C,EAAoBK,uBASjDd,aAAAA,GACI,OAAOzN,KAAKmL,aAAa+C,EAAoBM,sBASjDrB,QAAAA,GACI,OAAOnN,KAAKmL,aAAa+C,EAAoBQ,iBASjDrB,SAAAA,GACI,OAAOrN,KAAKmL,aAAa+C,EAAoBU,kBAyBjDrC,YAAAA,CAAaC,GACT,GAAIC,EAAiBhC,IAAI+B,GACrB,OAAOxM,KAAKmL,aAAa+C,EAAoBW,4BAC1C,GAAIlC,EAA2BlC,IAAI+B,GACtC,OAAOxM,KAAKmL,aAAa+C,EAAoBY,oCAC1C,GAAIjC,EAAgBpC,IAAI+B,GAC3B,OAAOxM,KAAKmL,aAAa+C,EAAoBa,2BAC1C,GAAIhC,EAA0BtC,IAAI+B,GACrC,OAAOxM,KAAKmL,aAAa+C,EAAoBc,mCAC1C,GAAI/B,EAA2BxC,IAAI+B,GACtC,OAAOxM,KAAKmL,aAAa+C,EAAoBe,oCAE7C,MAAM,IAAI5O,MAAM,2BASxB,sBAAM4N,GACF,OAAOjO,KAAKmL,aAAa+C,EAAoBgB,yBAUjDgC,oBAAAA,CAAqB9G,GACjB,IAAIA,EAAWoF,qBAGX,MAAM,IAAInP,MAAM,4DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaiG,qBAAqB5G,YAa1H6G,2BAAAA,CAA4BhH,GACxB,IAAIA,EAAWsF,4BAGX,MAAM,IAAIrP,MAAM,oEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBgB,oBAAoBV,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAamG,4BAA4B9G,YAazI+G,oBAAAA,CAAqBlH,GACjB,IAAIA,EAAWwF,qBAGX,MAAM,IAAIvP,MAAM,4DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBkC,YAAY5B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaqG,qBAAqBhH,YAa1HiH,mBAAAA,CAAoBpH,GAChB,IAAIA,EAAW0F,oBAGX,MAAM,IAAIzP,MAAM,2DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBoC,WAAW9B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAauG,oBAAoBlH,YAaxHmH,cAAAA,CAAetH,GACX,IAAIA,EAAW8F,eAGX,MAAM,IAAI7P,MAAM,qDAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqB8B,KAAKxB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAayG,eAAepH,YAa7GqH,2BAAAA,CAA4BxH,GACxB,IAAIA,EAAWgG,4BAGX,MAAM,IAAI/P,MAAM,oEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBuC,oBAAoBjC,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa2G,4BAA4BtH,YAazIuH,eAAAA,CAAgB1H,GACZ,IAAIA,EAAWkG,gBAGX,MAAM,IAAIjQ,MAAM,sDAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBgC,MAAM1B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa6G,gBAAgBxH,YAa/GyH,yBAAAA,CAA0B5H,GACtB,IAAIA,EAAWoG,0BAGX,MAAM,IAAInQ,MAAM,iEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBoB,iBAAiBd,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa+G,0BAA0B1H,YAapI2H,iCAAAA,CAAkC9H,GAC9B,IAAIA,EAAWsG,kCAGX,MAAM,IAAIrQ,MAAM,2EAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBsB,2BAA2BhB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaiH,kCAAkC5H,YAatJ6H,wBAAAA,CAAyBhI,GACrB,IAAIA,EAAWwG,yBAGX,MAAM,IAAIvQ,MAAM,gEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBwB,gBAAgBlB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAamH,yBAAyB9H,YAalI+H,iCAAAA,CAAkClI,GAC9B,IAAIA,EAAW0G,kCAGX,MAAM,IAAIzQ,MAAM,2EAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqB4B,2BAA2BtB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaqH,kCAAkChI,YAMtJiI,sBAAAA,CAAuBpI,GACnB,IAAIA,EAAW4G,uBAGX,MAAM,IAAI3Q,MAAM,8DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBwC,cAAclC,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAauH,uBAAuBlI,aChclI,MAAMmI,EACFvP,QACAwP,cACA7S,WAAAA,CAAYqD,EAAkBwP,GAC1B3S,KAAKmD,QAAUA,EACfnD,KAAK2S,cAAgBA,EAQzBvP,UAAAA,CAAWD,GACPnD,KAAKmD,QAAUA,EA+BnB,wBAAMyP,CAAmBvM,EAAwBwM,EAAkB/O,EAAmBgP,GAClF,IAAIpP,EAAc,EACdC,EAAY,EAahB,GAXImP,IACI,gBAAiBA,GAA4D,iBAAjCA,EAA4B,YACxEpP,EAAcoP,EAA8B,aAG5C,cAAeA,GAA4D,iBAAjCA,EAA4B,YACtEnP,EAAYmP,EAA4B,YAK/B,GAAbnP,EAAgB,CAChB,MAAMO,QAAYlE,KAAK2S,cAAcjO,kBACrC,GAAIR,aAAe7D,MACf,MAAM0H,EAAY,uDAEtBpE,EAAYO,CACf,CAGD,GAAIR,GAAeC,EACf,MAAMoE,EAAY,6CAGtB,aAAa/H,KAAK2S,cAAclP,mBAAmBC,EAAaC,EAAW3D,KAAKmD,QAAQnC,aAAcqF,OAAckJ,EAAWzL,GA8BnI,uBAAMiP,CAAkB1M,EAAsBwM,EAAkB/O,EAAmBgP,GAC/E,MAAM/O,QAAgB/D,KAAK4S,mBAAmB,CAACvM,GAAewM,EAAS/O,EAAQgP,GAC/E,QAAM/O,aAAmB1D,QAAU0D,EAAQe,OAAS,EACzCf,EAAQ,IAEnB5D,QAAQC,MAAM,+BAAgC2D,GACvC,IAAI1D,MAAM,qBAMrB,gBAAM2S,CAAWH,EAAkB/O,EAAmBgP,GAClD,MAAM,IAAIzS,MAAM,2BAMpB,iBAAM4S,CAAYJ,EAAkB/O,EAAmBgP,GACnD,MAAM,IAAIzS,MAAM,4BAuBxB,MAAM6S,EACFxP,YACAC,UACA7D,WAAAA,CAAY4D,EAAqBC,GAC7B3D,KAAK0D,YAAcA,EACnB1D,KAAK2D,UAAYA,GCjSzB,IAAIwP,EAAoC,KAElC,MAAAC,EAAmBA,KACrB,IAAKD,EAAiB,CAClB,MAAME,EAAS,IAAIC,OAAO,IAAIC,IAAI,kBAA+B,CAC7DrO,UAAM,IAEViO,GAAkBK,EAAAA,EAAAA,IAAgBH,EACrC,CACD,OAAOF,CAAe,ECkD1B,MAAMM,EACFtQ,QACAuQ,YACAzQ,KACA0P,cACAgB,eAQA7T,WAAAA,CAAYmD,EAA2ByQ,EAA+CC,GAClF3T,KAAKiD,KAAOA,GAAc,mCAC1BjD,KAAK2S,cAAgB,IAAI3P,EAAkBhD,KAAKiD,MAEhDjD,KAAK0T,YAAcA,GAA4B,IAAItK,EACnDpJ,KAAK2T,eAAiBA,EAQ1BvQ,UAAAA,CAAWD,GACPnD,KAAKmD,QAAUA,EAQnByQ,cAAAA,CAAeF,GACX1T,KAAK0T,YAAcA,EAQvBpQ,OAAAA,CAAQL,GACJjD,KAAKiD,KAAOA,EACZjD,KAAK2S,cAAcrP,QAAQL,GAQ/B4Q,iBAAAA,CAAkBF,GACd3T,KAAK2T,eAAiBA,EAkC1B,YAAMG,CACFtO,EACAuO,EACAC,EACAC,EACAC,EACAlT,GAGA,IACI,MAAMmT,EAAgBxN,EAAAA,GAAQ9F,WAAW2E,GACzC,IAAIoC,EACJ,IACIA,QAAsB5H,KAAK2S,cAAczL,WAAWiN,EAAc9L,KACrE,CAAC,MAAOnI,GAELC,QAAQiU,IAAe,WAAAD,EAAc9L,mDACxC,CACD,GAA4B,iBAAjBT,EACP,KAAO,WAAWuM,EAAc9L,gEAEvC,CAAC,MAAOnI,GACL,MAAM6H,EAAY,6BAA6B7H,IAClD,CAGD,IAiBImU,EAjBAC,EAAuBtT,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDmR,EAAuBtU,KAAKmD,QAAQnC,mBAGJ,IAAzBsT,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,CACnH,CAAC,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,sGAC3E,CAID,IACImU,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,eAC7H,CAAC,MAAOvN,GACL,MAAM6H,EAAY,iDAAiD7H,+DACtE,CACD,MAAOsU,EAAeC,GAAmBJ,EAGzC,IAAI9M,EACJ,IACIA,QAAgBvH,KAAK2S,cAAcrL,kBAAkB9B,EACxD,CAAC,MAAOtF,GACL,MAAM6H,EAAY,qDAAqD7H,yGAC1E,CAGD,MAAMwU,QAAWC,EAAAA,EAAmBC,2BAA2BN,EAAsB9O,EAASuO,EAAKG,EAAWlU,KAAKiD,KAAMsE,EAASiN,EAAeC,GACjJ,aAAazU,KAAK2S,cAAclK,kBAAkBiM,GA8BtD,+BAAMG,CAA0BpS,GAE5B,MAAM,YACFqS,EAAW,aACXC,EAAY,IACZhB,EAAG,WACHC,EAAU,OACVgB,EAAM,mBACNf,EAAkB,gBAClBgB,EAAe,WACfjU,EAAU,aACVkU,GACAzS,EAEJ,IAAIyR,EAAYzR,EAAQyR,UACpB9J,EAAa3H,EAAQ2H,WACrBC,EAAe5H,EAAQ4H,aACvB7E,EAAU/C,EAAQ+C,QAClB+B,EAAU9E,EAAQ8E,QAGtB,QAAgBgI,IAAZ/J,EACA,IACIA,QAAyBxF,KAAK2S,cAAczL,WAAW4N,EAC1D,CAAC,MAAO5U,GACL,MAAM6H,EAA6B,iBAAA+M,yBAAmC5U,qGACzE,MACMsF,aAAmBmB,EAAAA,KAC1BnB,EAAUA,EAAQjE,YAItB,IAiBI8S,EAjBAc,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAIV,IACIjB,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,CACnH,CAAC,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,sGAC3E,CAID,IACImU,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,eAC7H,CAAC,MAAOvN,GACL,MAAM6H,EAAY,iDAAiD7H,+DACtE,CACD,MAAOsU,EAAeC,GAAmBJ,EAGzC,IAAKjK,IAAeC,EAChB,KACKD,EAAYC,SAAuCrK,KAAK0T,YAAYvI,aAAa8J,EACrF,CAAC,MAAO/U,GACLC,QAAQiU,IAAI,kDAAkDlU,4CACjE,CAKL,GADwByG,EAAAA,GAAQ9F,WAAW2E,GAASiC,aAAa3C,OAC3C,IAAMyC,EACxB,IACIA,QAAgCvH,KAAK2S,cAAcrL,kBAAkBwN,EACxE,CAAC,MAAO5U,GACL,MAAM6H,EAAY,qDAAqD7H,yGAC1E,CAIL,aAAayU,EAAAA,EAAmBE,0BAA0BM,EAAqB3P,EAASuP,EAAcC,EAAQjB,EAAKG,EAAWlU,KAAKiD,KAAMsE,EAAS6C,EAAYC,EAAcmK,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQ3S,GACV,MAAMiS,QAAwB1U,KAAK6U,0BAA0BpS,GAC7D,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAoCtD,SAAMW,CACF7P,EACA8P,EACAN,EACAO,EACAhO,EACA0N,EACA7K,EACAC,EACArJ,EACAkU,GAGA,IAAIC,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAIV,IAAK/K,IAAeC,EAChB,KACKD,EAAYC,SAAuCrK,KAAK0T,YAAYvI,aAAa8J,EACrF,CAAC,MAAO/U,GACLC,QAAQiU,IAAI,kDAAkDlU,4CACjE,CAOL,OAHAC,QAAQiU,IAAI,2BACZjU,QAAQiU,IAAI,gBAAiBhK,GAC7BjK,QAAQiU,IAAI,kBAAmB/J,GACxBsK,EAAAA,EAAmBa,uBAAuBL,EAAqB3P,EAAS8P,EAAeN,EAAQO,GAAgB,EAAOhO,EAAS6C,EAAYC,EAAcrK,KAAKiD,KAAMiS,GAiB/K,UAAM9H,CACFqI,EACAC,EACA3B,EACAC,EACAC,EACAC,EACAlT,EACAkU,GAGA,IAUIb,EACAlH,EAXAgI,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC1HN,QAAkCnN,KAAK0T,YAAYvG,UACtD,CAAC,MAAOjN,GACL,MAAM6H,EAAY,iDAAiD7H,+DACtE,CACD,MAAOsU,EAAeC,GAAmBJ,GAClCsB,EAAgBC,GAAoBzI,EAG3C,IACI+G,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,CACnH,CAAC,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,sGAC3E,CAGD,IACIuV,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBhV,WAAW4U,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBhV,WAAW6U,EAC7F,CAAC,MAAOxV,GACL,MAAM6H,EAAY,kFACrB,CAGD,MAAM2M,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW3B,EAAKG,EAAWlU,KAAKiD,KAAM0S,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAyBtD,WAAMpH,CAAMyI,EAAqBC,EAAwChV,EAAyBkU,GAE9F,IAUI7H,EAVA8H,EAAsBnU,EAK1B,QAJmC,IAAxBmU,QAA+D,IAAjBnV,KAAKmD,UAC1DgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAKV,IACI9H,QAAmCrN,KAAK0T,YAAYrG,WACvD,CAAC,MAAOnN,GACL,MAAM6H,EAAY,iDAAiD7H,+DACtE,CACD,MAAO+V,EAAiBC,GAAqB7I,EAG7C,IACI2I,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBhV,WAAWmV,EACtG,CAAC,MAAO9V,GACL,MAAM6H,EAAY,8EACrB,CAGD,MAAM2M,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAchW,KAAKiD,KAAMgT,EAAiBC,EAAmBhB,GACzJ,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAatD,oBAAM0B,CACF5Q,EACA6Q,EACArB,EACAhU,GAGA,IAAIuG,EAEA4N,EAAsBnU,OACS,IAAxBmU,IAEHA,OADwB,IAAjBnV,KAAKmD,QACUnD,KAAKmD,QAAQnC,aAEb,IAAIF,EAAAA,IAKlC,IACIyG,QAAgBvH,KAAK2S,cAAcrL,kBAAkB9B,GACrD,MAAMqG,QAAgB8I,EAAAA,EAAmB2B,kBACrCnB,EACA3P,EACA6Q,EACArB,EACAzN,GAEJ,MAAO,CAAasE,EAAQzB,aAA4ByB,EAAQxB,eACnE,CAAC,MAAOnK,GACL,MAAM6H,EAAY,qCAAqC7H,oEAC1D,EAgCL,8BAAMqW,CACFC,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACAlT,EACAkU,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUIrC,EACA9H,EAXA4I,EAAsBnU,EAK1B,QAJmC,IAAxBmU,QAA+D,IAAjBnV,KAAKmD,UAC1DgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC1HlB,QAAsCvM,KAAK0T,YAAYnH,aAAamK,EACvE,CAAC,MAAOxW,GACL,MAAM6H,EAAY,iDAAiD7H,+DACtE,CACD,MAAOsU,EAAeC,GAAmBJ,GAClCuC,EAAoBC,GAAwBtK,EAGnD,IAEI,MAAMzI,EAAmB,GACrBgT,EAAqBJ,IAErBV,QAAsChW,KAAKuU,iBAAiBR,EAAK,GAAIiC,EAAc/B,GACnFnQ,EAAOsC,KAAK4P,EAAajQ,UAEzBiQ,OAAezG,EAEnB2E,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAKjQ,EAAQoQ,EAAWD,QAAsB1E,CACvH,CAAC,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,sGAC3E,CAGD,aAAayU,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAcjC,EAAKG,EAAWlU,KAAKiD,KAAM2T,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA1C,EACA/S,EACAkU,GAEA,OAAOlV,KAAKuW,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOxE,OAAWA,OAAWA,EAAWvO,EAAYkU,GAmB/H,4CAAM8B,CACFR,EACAC,EACA1C,EACA/S,EACAkU,GAEA,OAAOlV,KAAKuW,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOxE,OAAWA,OAAWA,EAAWvO,EAAYkU,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACAlT,EACAkU,GAEA,MAAMR,QAAwB1U,KAAKuW,yBAAyBC,EAAQC,EAAWC,EAAc3C,EAAKC,EAAYC,EAAoB+B,EAAc9B,EAAWlT,EAAYkU,GACvK,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB/T,EAAmC,CAAC,GAChK,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BhB,EAAMtR,EAAQsR,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa/V,iBAAgB,gBACjG0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBW,YAAYD,OAC5C9C,YAAaoC,EAAqBW,YAAY0B,SAC9CxE,SAAU,6BACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB/T,EAAmC,CAAC,GAC/I,MAAMiS,QAAwB1U,KAAKkX,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ/T,GAC7H,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBrV,EAAmC,CAAC,GAC/J,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BhB,EAAMtR,EAAQsR,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa/V,gBAAiB,GAAGwW,EAAmBxW,gBAAe,gBACvH0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBc,eAAeJ,OAC/C9C,YAAaoC,EAAqBc,eAAeuB,SACjDxE,SAAU,gCACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBrV,EAAmC,CAAC,GAC/I,MAAMiS,QAAwB1U,KAAK6X,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYrV,GAC5H,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB/T,EAAmC,CAAC,GAC3G,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BhB,EAAMtR,EAAQsR,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAgB,GAAGG,EAAa/V,iBAAgB,gBAC1D0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBwC,cAAc9B,OAC9C9C,YAAaoC,EAAqBwC,cAAcH,SAChDxE,SAAU,+BACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,OAAO1X,KAAK6U,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB/T,EAAmC,CAAC,GAC3F,MAAMiS,QAAwB1U,KAAKiY,6BAA6Bd,EAAgBX,EAAQ/T,GACxF,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAyBtD,uCAAMyD,CAAkChB,EAAwB1U,EAAmC,CAAC,GAChG,MAAM,YACFqS,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAMtR,EAAQsR,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBgB,oBAAoBN,OACpD9C,YAAaoC,EAAqBgB,oBAAoBqB,SACtDxE,SAAU,qCACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwB1U,EAAmC,CAAC,GAChF,MAAMiS,QAAwB1U,KAAKmY,kCAAkChB,EAAgB1U,GACrF,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,uCAAM2D,CAAkCC,EAA0B7V,EAAmC,CAAC,GAClG,MAAM,YACFqS,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBgB,EAAS,CAACsD,EAAgB/W,YAAW,gBACrC0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBuC,oBAAoB7B,OACpD9C,YAAaoC,EAAqBuC,oBAAoBF,SACtDxE,SAAU,wCAEXuO,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAKoV,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B7V,EAAmC,CAAC,GAClF,MAAMiS,QAAmB1U,KAAKqY,kCAAkCC,EAAiB7V,GACjF,OAAOzC,KAAK2S,cAAclK,kBAAkBiM,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMrT,EAAuBqT,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCnT,EAAUiT,EAAkBvR,aAC5BmD,EAAeoO,EAAkB/M,kBACvC,OAAOkN,EAAAA,EAAAA,IAAwBxT,EAAWiF,EAAc7E,EAAS6Q,EACpE,CAAC,MAAMnW,GAEJ,OADAC,QAAQoG,KAAK,6EACN,CACV,EASLsS,uBAAAA,CAAwBrT,GACpB,OAAOmB,EAAAA,GAAQ9F,WAAW2E,GAQ9BiS,cAAAA,GACI,OAAO9Q,EAAAA,GAAQmS,oBAQnBC,aAAAA,CAAcvT,GACV,IAEI,OADSmB,EAAAA,GAAQ9F,WAAW2E,IACrB,CACV,CAAC,MAAOtF,GACL,OAAO,CACV,EAIL,sBAAMqU,CAAiBiC,EAAgB1S,EAAkB8B,EAAmC7F,GACxF,IACI,OAAO6F,aAAkBiQ,EAAAA,GAAkBjQ,EAASiQ,EAAAA,GAAgBhV,WAAmB+E,EAC1F,CAAC,MAAO1F,GACL,IACI,MAAMyT,EAAiC3T,KAAK2T,eAC5C,aAA+BA,EAAeZ,kBAAkByD,GAAQ,EAAM1S,EAAQ/D,EACzF,CAAC,MAAOG,GACL,MAAM6H,EAAY,sDAAsD7H,sGAC3E,CACJ,GAKT,SAAS4W,EAAqBJ,GAC1B,OAAOsC,EAAuBvO,IAAIiM,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOuC,EAAqBxO,IAAIiM,GAAgBA,EAC5C3O,EAAY,0BAA0B2O,8FAC9C,CCjwCA,MAAM9M,EAAYsP,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAMhP,EAAgBa,EAAAA,GAAqBmO,EAAShP,cAEpD,IAAKA,EACD,MAAM,IAAIhK,MAAM,wBAA0BgZ,EAAShP,cAGvD,MAAO,CACHrB,KAAMqQ,EAASrQ,KACf4C,QAASyN,EAASzN,QAClBI,OAAQqN,EAASrN,OACjB2B,SAAU0L,EAAS1L,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAamN,EAAQF,EAAAA,GAASjN,eAC9BG,eAAgBgN,EAAQF,EAAAA,GAAS9M,kBACjCE,oBAAqB8M,EAAQF,EAAAA,GAAS5M,uBACtCkB,YAAa4L,EAAQF,EAAAA,GAAS1L,eAC9BE,WAAY0L,EAAQF,EAAAA,GAASxL,cAC7BE,UAAWwL,EAAQF,EAAAA,GAAStL,aAC5BR,KAAMgM,EAAQF,EAAAA,GAAS9L,QACvBS,oBAAqBuL,EAAQF,EAAAA,GAASrL,uBACtCP,MAAO8L,EAAQF,EAAAA,GAAS5L,SACxBZ,iBAAkB0M,EAAQF,EAAAA,GAASxM,oBACnCE,2BAA4BwM,EAAQF,EAAAA,GAAStM,8BAC7CE,gBAAiBsM,EAAQF,EAAAA,GAASpM,mBAClCE,0BAA2BoM,EAAQF,EAAAA,GAASlM,6BAC5CE,2BAA4BkM,EAAQF,EAAAA,GAAShM,8BAC7CY,cAAesL,EAAQF,EAAAA,GAASpL,iBAChCvC,OAAQ,SAASzD,GACb,OAAI9H,KAAK2H,eAAeG,GACZ9H,KAAa8H,GAEd,IAAIzH,MAAM,QAAQyH,mBAK/BkR,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE7M,EAAmB,IAAI6M,IAAI,CAC7B,UACA,mBACA,oBAEE3M,EAA6B,IAAI2M,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEzM,EAAkB,IAAIyM,IAAI,CAC5B,SACA,kBACA,mBAEEvM,EAA4B,IAAIuM,IAAI,CACtC,mBACA,4BACA,2BAEErM,EAA6B,IAAIqM,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAASvR,EAAY5F,GAEjB,MADAhC,QAAQC,MAAM+B,GACRA,CACV,CA+BAG,eAAeiX,IACXpZ,QAAQoG,KAAK,6DACjB,+DChJA,SAASiT,EAAYhX,EAAKiX,EAAQC,EAAQpY,GAClC,OAAO,IAAI8N,SAASC,IAChB,MAAMgE,EAAS,IAAIC,OAAO9Q,EAAK,CAC3B0C,KAAM,WAGVmO,EAAOsG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPxK,EAAQgE,GAIJA,EAAOyG,OACPzG,EAAOyG,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGV3G,EAAO4G,YAAY,CACfR,SACAC,SACApY,WACF,GAEd,CAEA,IAAI4Y,sMAEJ,MAAMC,EAAO,IAAInW,MAAM,KAAKoW,UAAK7K,GAIjC,SAAS8K,EAAUC,GAAO,OAAOH,EAAKG,EAAK,CAF3CH,EAAK/T,UAAKmJ,EAAW,MAAM,GAAM,GAIjC,IAAIgL,EAAYJ,EAAKrV,OAErB,SAAS0V,EAAWF,GACZA,EAAM,MACVH,EAAKG,GAAOC,EACZA,EAAYD,EAChB,CAEA,SAASG,EAAWH,GAChB,MAAMI,EAAML,EAAUC,GAEtB,OADAE,EAAWF,GACJI,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAM1a,MAAM,4BAA4B,GAE5J,oBAAhBua,aAA+BD,EAAkBI,SAC5D,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWhB,EAAKR,OAAOwB,SACzEF,EAAqB,IAAIrR,WAAWuQ,EAAKR,OAAOwB,SAE7CF,CACX,CAEA,SAASG,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPT,EAAkBI,OAAOE,IAAkBK,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfjB,IAAcJ,EAAKrV,QAAQqV,EAAK/T,KAAK+T,EAAKrV,OAAS,GACvD,MAAMwV,EAAMC,EAIZ,OAHAA,EAAYJ,EAAKG,GAEjBH,EAAKG,GAAOkB,EACLlB,CACX,CAEA,IAAImB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMvb,MAAM,4BAA4B,GAE/Iwb,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKzR,IAAI0R,GACF,CACHC,KAAMH,EAAIhX,OACVoX,QAASF,EAAIlX,OAErB,EAEA,SAASqX,EAAkBL,EAAKM,EAAQC,GAEpC,QAAgB9M,IAAZ8M,EAAuB,CACvB,MAAML,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMgB,EAAOJ,EAAIlX,OAAQ,KAAO,EAGtC,OAFAmW,IAAkBqB,SAASlB,EAAKA,EAAMY,EAAIlX,QAAQwF,IAAI0R,GACtDP,EAAkBO,EAAIlX,OACfsW,CACf,CAEI,IAAIC,EAAMS,EAAIhX,OACVsW,EAAMgB,EAAOf,EAAK,KAAO,EAE7B,MAAMkB,EAAMtB,IAEZ,IAAIuB,EAAS,EAEb,KAAOA,EAASnB,EAAKmB,IAAU,CAC3B,MAAMC,EAAOX,EAAIY,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAInB,EAAMoB,GAAUC,CAC5B,CAEI,GAAID,IAAWnB,EAAK,CACD,IAAXmB,IACAV,EAAMA,EAAIR,MAAMkB,IAEpBpB,EAAMiB,EAAQjB,EAAKC,EAAKA,EAAMmB,EAAsB,EAAbV,EAAIhX,OAAY,KAAO,EAC9D,MAAMiX,EAAOd,IAAkBqB,SAASlB,EAAMoB,EAAQpB,EAAMC,GAG5DmB,GAFYX,EAAaC,EAAKC,GAEhBG,QACdd,EAAMiB,EAAQjB,EAAKC,EAAKmB,EAAQ,KAAO,CAC/C,CAGI,OADAf,EAAkBe,EACXpB,CACX,CAEA,SAASuB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB3B,SAAWhB,EAAKR,OAAOwB,SACzE2B,EAAqB,IAAIE,WAAW7C,EAAKR,OAAOwB,SAE7C2B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM/X,SAAc+X,EACpB,GAAY,UAAR/X,GAA4B,WAARA,GAA4B,MAAP+X,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR/X,EACA,MAAQ,IAAG+X,KAEf,GAAY,UAAR/X,EAAkB,CAClB,MAAMgY,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAARhY,EAAoB,CACpB,MAAM8D,EAAOiU,EAAIjU,KACjB,MAAmB,iBAARA,GAAoBA,EAAKlE,OAAS,EACjC,YAAWkE,KAEZ,UAEnB,CAEI,GAAIhF,MAAMmZ,QAAQF,GAAM,CACpB,MAAMnY,EAASmY,EAAInY,OACnB,IAAI+F,EAAQ,IACR/F,EAAS,IACT+F,GAASmS,EAAYC,EAAI,KAE7B,IAAI,IAAIpY,EAAI,EAAGA,EAAIC,EAAQD,IACvBgG,GAAS,KAAOmS,EAAYC,EAAIpY,IAGpC,OADAgG,GAAS,IACFA,CACf,CAEI,MAAMuS,EAAiB,sBAAsBC,KAAK9b,SAAS+b,KAAKL,IAChE,IAAIM,EACJ,KAAIH,EAAetY,OAAS,GAIxB,OAAOvD,SAAS+b,KAAKL,GAEzB,GALIM,EAAYH,EAAe,GAKd,UAAbG,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUR,GAAO,GACrD,CAAU,MAAOS,GACL,MAAO,QACnB,CAGI,OAAIT,aAAe5c,MACP,GAAE4c,EAAIjU,SAASiU,EAAI9a,YAAY8a,EAAIU,QAGxCJ,CACX,CAEA,MAAMK,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B9D,EAAK+D,oBAAoB1b,IAAIyb,EAAME,KAAnChE,CAAyC8D,EAAMG,EAAGH,EAAMI,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMR,EAAQ,CAAEG,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbX,EAAMS,MACN,MAAMN,EAAIH,EAAMG,EAChBH,EAAMG,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGH,EAAMI,KAAMO,EACpC,CAAU,QACsB,KAAdX,EAAMS,KACRvE,EAAK+D,oBAAoB1b,IAAIyb,EAAME,KAAnChE,CAAyCiE,EAAGH,EAAMI,GAClDR,EAAcG,WAAWC,IAEzBA,EAAMG,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWZ,EAChBJ,EAAcE,SAASY,EAAMV,EAAOA,GAC7BU,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClC5E,EAAK6E,6HAA6HT,EAAMC,EAAMhD,EAAcuD,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI7e,MAAO,wBAAuB6e,EAAMlW,QAElD,OAAOiW,EAAS7D,GACpB,CAEA,SAAS+D,EAAkBrD,EAAKM,GAC5B,MAAMhB,EAAMgB,EAAoB,EAAbN,EAAIhX,OAAY,KAAO,EAG1C,OAFAmW,IAAkB3Q,IAAIwR,EAAKV,EAAM,GACjCK,EAAkBK,EAAIhX,OACfsW,CACX,CAiBA,SAASgE,EAAwBha,EAAW0G,EAAetG,EAAS6Q,GAChE,IACI,MAAMgJ,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAa5Z,EAAWma,GACxBP,EAAalT,EAAe0T,IAC5BR,EAAaxZ,EAASia,IACtB,MAAMC,EAAOvD,EAAkB9F,EAAa6D,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKtB,wBAAwByG,EAAQja,EAAU0a,UAAWhU,EAAcgU,UAAWta,EAAQsa,UAAWJ,EAAMG,GAC5G,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAc,IAAPD,CACf,CAAM,QACE7F,EAAKoF,gCAAgC,GAC7C,CACA,CAEA,IAAIW,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB/E,SAAWhB,EAAKR,OAAOwB,SAC/E+E,EAAwB,IAAIE,cAAcjG,EAAKR,OAAOwB,SAEnD+E,CACX,CAEA,SAASG,EAAoBhF,EAAKC,GAE9B,OADAD,KAAc,EACPH,IAAkBqB,SAASlB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAASgF,EAAeC,GACpBpG,EAAKmG,eAAeC,EACxB,CAOA,SAASC,EAAe/d,EAAKge,GAEzB,OAAO/F,EADKP,EAAKuG,eAAelF,EAAc/Y,GAAMge,GAExD,CAEA,SAASE,EAAYlC,EAAGG,GACpB,IACI,OAAOH,EAAEmC,MAAM3gB,KAAM2e,EAC7B,CAAM,MAAOze,GACLga,EAAK0G,qBAAqBrF,EAAcrb,GAChD,CACA,CACA,SAAS2gB,EAAkBvC,EAAMC,EAAMO,EAAMgC,GACzC5G,EAAK6G,gEAAgEzC,EAAMC,EAAMhD,EAAcuD,GAAOvD,EAAcuF,GACxH,CAEA,MAAME,EAAuD,oBAAzBnD,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK+G,mBAAmB7F,IAAQ,WAItE,MAAM5a,EAEF,aAAO0gB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO3gB,EAAQ4gB,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChB4F,EAAoBlD,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBkB,EAAoBjD,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK+G,mBAAmB7F,EAChC,CASI,uBAAO7a,CAAiBghB,GACpBvC,EAAauC,EAAaC,IAC1B,MAAM9G,EAAMR,EAAKuH,yBAAyBF,EAAYzB,WACtD,OAAOtf,EAAQ0gB,OAAOxG,EAC9B,CASI,oBAAOgH,CAAcC,GACjB3C,EAAa2C,EAAUC,IACvB,MAAMlH,EAAMR,EAAK2H,sBAAsBF,EAAS7B,WAChD,OAAOtf,EAAQ0gB,OAAOxG,EAC9B,CASI,kBAAOtZ,CAAYE,GACf,MAAMoe,EAAOvD,EAAkB7a,EAAS4Y,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPf,EAAMR,EAAK4H,oBAAoBpC,EAAMG,GAC3C,OAAOrf,EAAQ0gB,OAAOxG,EAC9B,CAQIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK+H,kBAAkB5C,EAAQrf,KAAK8f,WACpC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI5f,MAAAA,CAAOD,EAASE,GACZ,MAAMqd,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACbuD,EAAa3c,EAAW8f,IAExB,OAAe,IADHjI,EAAKkI,eAAepiB,KAAK8f,UAAWJ,EAAMG,EAAMxd,EAAUyd,UAE9E,GAGA,MAAMuC,EAAyD,oBAAzBxE,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoI,qBAAqBlH,IAAQ,WAIxE,MAAMmH,EAEF,aAAOrB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOoB,EAAUnB,WAGpC,OAFA5F,EAAIsE,UAAY1E,EAChBiH,EAAsBvE,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC5CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuC,EAAsBtE,WAAW/d,MAC1Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoI,qBAAqBlH,EAClC,CAKI7Z,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsI,mBAAmBnD,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOnhB,CAAWuE,GACd,IACI,MAAMia,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB/W,EAAW8U,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACbvB,EAAKuI,qBAAqBpD,EAAQK,EAAMG,GACxC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOuC,EAAUrB,OAAOnB,EACpC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMoD,EAAiE,oBAAzB7E,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKyI,6BAA6BvH,IAAQ,WAOhF,MAAMwH,EAEF,aAAO1B,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOyB,EAAkBxB,WAG5C,OAFA5F,EAAIsE,UAAY1E,EAChBsH,EAA8B5E,SAAStC,EAAKA,EAAIsE,UAAWtE,GACpDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB4C,EAA8B3E,WAAW/d,MAClCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKyI,6BAA6BvH,EAC1C,CAOIyH,UAAAA,GAEI,OAAOpI,EADKP,EAAK4I,6BAA6B9iB,KAAK8f,WAE3D,CAOIpH,YAAAA,GACI,MAAMgC,EAAMR,EAAK6I,+BAA+B/iB,KAAK8f,WACrD,OAAe,IAARpF,OAAYnL,EAAYgQ,EAAU2B,OAAOxG,EACxD,CAKI9P,OAAAA,GACI,IACI,MAAMyU,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8I,0BAA0B3D,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOiD,GAAQ/B,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI4D,aAAAA,GACI,MAAMxI,EAAMR,EAAKiJ,gCAAgCnjB,KAAK8f,WACtD,OAAe,IAARpF,OAAYnL,EAAY6T,GAAWlC,OAAOxG,EACzD,CAOIhP,eAAAA,GACI,MAAMgP,EAAMR,EAAKmJ,kCAAkCrjB,KAAK8f,WACxD,OAAON,GAAa0B,OAAOxG,EACnC,CAKI/B,aAAAA,GACI,IAAIoJ,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoJ,gCAAgCjE,EAAQrf,KAAK8f,WAClD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI9a,UAAAA,GACI,MAAMwT,EAAMR,EAAKqJ,6BAA6BvjB,KAAK8f,WACnD,OAAOL,GAAQyB,OAAOxG,EAC9B,GAGA,MAAM8I,EAAqD,oBAAzB3F,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKuJ,iBAAiBrI,IAAQ,WAGpE,MAAMsI,EAEF,aAAOxC,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOuC,EAAMtC,WAGhC,OAFA5F,EAAIsE,UAAY1E,EAChBoI,EAAkB1F,SAAStC,EAAKA,EAAIsE,UAAWtE,GACxCA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB0D,EAAkBzF,WAAW/d,MACtBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKuJ,iBAAiBrI,EAC9B,CAII7Z,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKyJ,eAAetE,EAAQrf,KAAK8f,WACjC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOnhB,CAAW+iB,GACd,IACI,MAAMvE,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkByH,EAAO1J,EAAKyF,kBAAmBzF,EAAK0F,oBAC7DC,EAAOpE,EACbvB,EAAK2J,iBAAiBxE,EAAQK,EAAMG,GACpC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO0D,EAAMxC,OAAOnB,EAChC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMwE,EAAuD,oBAAzBjG,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6J,mBAAmB3I,IAAQ,KAItE,MAAM6H,GAEF,aAAO/B,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO8B,GAAQ7B,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChB0I,EAAoBhG,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgE,EAAoB/F,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6J,mBAAmB3I,EAChC,CAUItb,WAAAA,CAAYiM,EAAaD,GACrBkT,EAAajT,EAAaqX,IAC1B,IAAI1D,EAAO3T,EAAYsV,qBACvBrC,EAAalT,EAAe0T,IAC5B,IAAIwE,EAAOlY,EAAcuV,qBACzB,MAAM3G,EAAMR,EAAK+J,YAAYvE,EAAMsE,GAEnC,OADAhkB,KAAK8f,UAAYpF,IAAQ,EAClB1a,IACf,CAOIoK,UAAAA,GACI,IACI,MAAMiV,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgK,mBAAmB7E,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOoD,GAAWlC,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOIjV,YAAAA,GACI,IACI,MAAMgV,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKiK,qBAAqB9E,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOR,GAAa0B,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,EAGA,MAAM8E,GAAwD,oBAAzBvG,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKmK,oBAAoBjJ,IAAQ,YAGvE,MAAMlC,EAEF,aAAOgI,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOjI,EAASkI,WAGnC,OAFA5F,EAAIsE,UAAY1E,EAChBgJ,GAAqBtG,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC3CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBsE,GAAqBrG,WAAW/d,MACzBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKmK,oBAAoBjJ,EACjC,CAII,QAAIpS,GACA,IAAI+Y,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoK,wBAAwBjF,EAAQrf,KAAK8f,WAC1C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAIhZ,CAAKsV,GACL,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKqK,wBAAwBvkB,KAAK8f,UAAWJ,EAAMG,EAC3D,CAII,WAAIjU,GACA,IAAImW,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsK,2BAA2BnF,EAAQrf,KAAK8f,WAC7C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIpW,CAAQ0S,GACR,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKuK,2BAA2BzkB,KAAK8f,UAAWJ,EAAMG,EAC9D,CAII,UAAI7T,GACA,IAAI+V,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwK,0BAA0BrF,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIhW,CAAOsS,GACP,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKyK,0BAA0B3kB,KAAK8f,UAAWJ,EAAMG,EAC7D,CAII,YAAIlS,GACA,IAAIoU,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0K,4BAA4BvF,EAAQrf,KAAK8f,WAC9C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAIrU,CAAS2Q,GACT,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK2K,4BAA4B7kB,KAAK8f,UAAWJ,EAAMG,EAC/D,CAII,gBAAIxV,GACA,IAAI0X,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4K,gCAAgCzF,EAAQrf,KAAK8f,WAClD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI3X,CAAaiU,GACb,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK6K,gCAAgC/kB,KAAK8f,UAAWJ,EAAMG,EACnE,CAII,cAAO1G,GACH,IAAI4I,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8K,iBAAiB3F,GACtB,IAAIU,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAO/V,GACH,MAAMyO,EAAMR,EAAK+K,uBACjB,OAAO/L,EAASgI,OAAOxG,EAC/B,CAII,qBAAOtO,GACH,MAAMsO,EAAMR,EAAKgL,0BACjB,OAAOhM,EAASgI,OAAOxG,EAC/B,CAII,0BAAOpO,GACH,MAAMoO,EAAMR,EAAKiL,+BACjB,OAAOjM,EAASgI,OAAOxG,EAC/B,CAII,kBAAOlN,GACH,MAAMkN,EAAMR,EAAKkL,uBACjB,OAAOlM,EAASgI,OAAOxG,EAC/B,CAII,iBAAOhN,GACH,MAAMgN,EAAMR,EAAKmL,sBACjB,OAAOnM,EAASgI,OAAOxG,EAC/B,CAII,gBAAO9M,GACH,MAAM8M,EAAMR,EAAKoL,qBACjB,OAAOpM,EAASgI,OAAOxG,EAC/B,CAII,WAAOtN,GACH,MAAMsN,EAAMR,EAAKqL,gBACjB,OAAOrM,EAASgI,OAAOxG,EAC/B,CAII,0BAAO7M,GACH,MAAM6M,EAAMR,EAAKsL,+BACjB,OAAOtM,EAASgI,OAAOxG,EAC/B,CAII,YAAOpN,GACH,MAAMoN,EAAMR,EAAKuL,iBACjB,OAAOvM,EAASgI,OAAOxG,EAC/B,CAII,uBAAOhO,GACH,MAAMgO,EAAMR,EAAKwL,4BACjB,OAAOxM,EAASgI,OAAOxG,EAC/B,CAII,iCAAO9N,GACH,MAAM8N,EAAMR,EAAKyL,sCACjB,OAAOzM,EAASgI,OAAOxG,EAC/B,CAII,sBAAO5N,GACH,MAAM4N,EAAMR,EAAK0L,2BACjB,OAAO1M,EAASgI,OAAOxG,EAC/B,CAII,gCAAO1N,GACH,MAAM0N,EAAMR,EAAK2L,qCACjB,OAAO3M,EAASgI,OAAOxG,EAC/B,CAII,iCAAOxN,GACH,MAAMwN,EAAMR,EAAK4L,sCACjB,OAAO5M,EAASgI,OAAOxG,EAC/B,CAII,oBAAO5M,GACH,MAAM4M,EAAMR,EAAK6L,yBACjB,OAAO7M,EAASgI,OAAOxG,EAC/B,GAGA,MAAMsL,GAA4D,oBAAzBnI,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK+L,wBAAwB7K,IAAQ,YAK3E,MAAM8K,EAEF,aAAOhF,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO+E,EAAa9E,WAGvC,OAFA5F,EAAIsE,UAAY1E,EAChB4K,GAAyBlI,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC/CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBkG,GAAyBjI,WAAW/d,MAC7Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK+L,wBAAwB7K,EACrC,CAKItb,WAAAA,CAAYqmB,GACR,IACI,MAAM9G,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBgK,EAAYjM,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAKkM,iBAAiB/G,EAAQK,EAAMG,GACpC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAGrB,OADAhgB,KAAK8f,UAAYC,IAAO,EACjB/f,IACnB,CAAU,QACEka,EAAKoF,gCAAgC,GACjD,CACA,CASI+G,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAMlH,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBmK,EAAYpM,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkBoK,EAAYrM,EAAKyF,kBAAmBzF,EAAK0F,oBAClE4G,EAAO/K,EACbvB,EAAKuM,0BAA0BpH,EAAQrf,KAAK8f,UAAWJ,EAAMG,EAAMmE,EAAMwC,GACzE,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWsF,EAEjC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAKI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwM,sBAAsBrH,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOnhB,CAAW8lB,GACd,IACI,MAAMtH,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBwK,EAAGzM,EAAKyF,kBAAmBzF,EAAK0F,oBACzDC,EAAOpE,EACbvB,EAAK0M,wBAAwBvH,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOkG,EAAahF,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMuH,GAA0D,oBAAzBhJ,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK4M,sBAAsB1L,IAAQ,YAIzE,MAAMta,EAEF,aAAOogB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOrgB,EAAWsgB,WAGrC,OAFA5F,EAAIsE,UAAY1E,EAChByL,GAAuB/I,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC7CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB+G,GAAuB9I,WAAW/d,MAC3Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK4M,sBAAsB1L,EACnC,CAMItb,WAAAA,GACI,MAAM4a,EAAMR,EAAK6M,iBAEjB,OADA/mB,KAAK8f,UAAYpF,IAAQ,EAClB1a,IACf,CASI,0BAAOmB,CAAoBD,GACvB,MAAMwe,EAAOP,EAAkBje,EAAMgZ,EAAKyF,mBACpCE,EAAOpE,EACPf,EAAMR,EAAK8M,+BAA+BtH,EAAMG,GACtD,OAAO/e,EAAWogB,OAAOxG,EACjC,CASI,kBAAOtZ,CAAYmgB,GACf,IACI,MAAMlC,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBoF,EAAarH,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAK+M,uBAAuB5H,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOlf,EAAWogB,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQIre,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgN,qBAAqB7H,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIxd,WAAAA,GACI,MAAMkW,EAAMR,EAAKiN,uBAAuBnnB,KAAK8f,WAC7C,OAAO8B,GAAQV,OAAOxG,EAC9B,CAOI0M,UAAAA,GACI,MAAM1M,EAAMR,EAAKmN,sBAAsBrnB,KAAK8f,WAC5C,OAAOwH,EAAQpG,OAAOxG,EAC9B,CASIxY,IAAAA,CAAKC,GACD,MAAMud,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACPf,EAAMR,EAAKqN,gBAAgBvnB,KAAK8f,UAAWJ,EAAMG,GACvD,OAAOsC,GAAUjB,OAAOxG,EAChC,CAUI,mBAAO8M,CAAaC,GAChB,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKwN,wBAAwBrI,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO2H,GAAqBzG,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAUI7d,YAAAA,CAAagmB,GACT,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK0N,wBAAwBvI,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC3D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO2H,GAAqBzG,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAWI,+BAAOve,CAAyBL,EAAY+mB,GACxC,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAate,EAAYinB,IACzB,MAAMjI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK2N,oCAAoCxI,EAAQ3e,EAAWof,UAAWJ,EAAMG,GAC7E,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOlf,EAAWogB,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMwI,GAAoE,oBAAzBjK,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6N,gCAAgC3M,IAAQ,YAInF,MAAMxa,EAEF,aAAOsgB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOvgB,EAAqBwgB,WAG/C,OAFA5F,EAAIsE,UAAY1E,EAChB0M,GAAiChK,SAAStC,EAAKA,EAAIsE,UAAWtE,GACvDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgI,GAAiC/J,WAAW/d,MACrCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6N,gCAAgC3M,EAC7C,CAYI,wBAAO4M,CAAkBzG,EAAakG,GAClC,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK0N,wBAAwBvI,EAAQkC,EAAYzB,UAAWJ,EAAMG,GAClE,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOpf,EAAqBsgB,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAUI2I,mBAAAA,CAAoBR,GAChB,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKgO,yCAAyC7I,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5E,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOwB,GAAWN,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKiO,8BAA8B9I,EAAQrf,KAAK8f,WAChD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOnhB,CAAWH,GACd,IACI,MAAM2e,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBzb,EAAYwZ,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAKkO,gCAAgC/I,EAAQK,EAAMG,GACnD,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOpf,EAAqBsgB,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAM+I,GAAuD,oBAAzBxK,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoO,mBAAmBlN,IAAQ,YAItE,MAAMzU,EAEF,aAAOua,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOxa,EAAQya,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChBiN,GAAoBvK,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuI,GAAoBtK,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoO,mBAAmBlN,EAChC,CASI,iBAAOva,CAAW2E,GACd,IACI,MAAM6Z,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACbvB,EAAKqO,mBAAmBlJ,EAAQK,EAAMG,GACtC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOrZ,EAAQua,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsO,iBAAiBnJ,EAAQrf,KAAK8f,WACnC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASIyG,WAAAA,CAAYnT,GACR,MAAMoK,EAAOvD,EAAkB7G,EAAe4E,EAAKyF,kBAAmBzF,EAAK0F,oBACrEC,EAAOpE,EAEb,OAAe,IADHvB,EAAKwO,oBAAoB1oB,KAAK8f,UAAWJ,EAAMG,EAEnE,CAuBI8I,YAAAA,GAEI,OAAOlO,EADKP,EAAK0O,qBAAqB5oB,KAAK8f,WAEnD,CAyCI+I,iBAAAA,CAAkBvT,GACd,IACI,MAAM+J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB7G,EAAe4E,EAAKyF,kBAAmBzF,EAAK0F,oBACrEC,EAAOpE,EACbvB,EAAK4O,0BAA0BzJ,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC7D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAqBIyJ,WAAAA,GACI,IACI,MAAM1J,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8O,oBAAoB3J,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAgCI2J,gBAAAA,CAAiBC,GACb,IACI,MAAM7J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKiP,yBAAyB9J,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAmDI8J,gBAAAA,CAAiBC,GACb,IACI,MAAMhK,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBkN,EAAanP,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKoP,yBAAyBjK,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI,wBAAOxG,GACH,MAAM4B,EAAMR,EAAKqP,4BACjB,OAAO5iB,EAAQua,OAAOxG,EAC9B,CAOIrS,EAAAA,GACI,IAAI0Z,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsP,WAAWnK,EAAQrf,KAAK8f,WAC7B,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI1gB,OAAAA,GACI,IACI,MAAM+d,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKuP,gBAAgBpK,EAAQrf,KAAK8f,WAClC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOsH,EAAQpG,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASIoK,OAAAA,CAAQC,GACJ3K,EAAa2K,EAAOhjB,GAEpB,OAAe,IADHuT,EAAK0P,gBAAgB5pB,KAAK8f,UAAW6J,EAAM7J,UAE/D,CA0BIrY,UAAAA,GAEI,OAAOgT,EADKP,EAAK2P,mBAAmB7pB,KAAK8f,WAEjD,GAGA,MAAMgK,GAA8D,oBAAzBjM,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6P,0BAA0B3O,IAAQ,YAG7E,MAEIiG,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgK,GAA2B/L,WAAW/d,MAC/Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6P,0BAA0B3O,EACvC,CA8BI,iCAAOxG,CAA2B2M,EAAa/b,EAASwkB,EAAaC,EAAYznB,EAAK+E,EAAS2iB,EAAiBC,EAAmBC,GAC/HpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACb,IAAIuI,EAAO,EACNrH,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBrG,EAAOiG,EAAW5I,sBAEtB,IAAIiJ,EAAO3N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2K,EAAO9O,EACX,IAAI+O,EAAO,EACN7N,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoH,EAAON,EAAgB7I,sBAE3B,IAAIoJ,EAAO,EACN9N,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiL,EAAON,EAAkB9I,sBAE7B,IAAIqJ,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK0Q,0CAA0CrJ,EAAYzB,UAAWJ,EAAMG,EAAMmK,EAAahG,EAAMsG,EAAMC,EAAM5N,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUijB,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBrlB,EAAS+B,GAClC,MAAMmY,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EAEb,OAAOhB,EADKP,EAAK4Q,qCAAqCpL,EAAMG,EAAMlD,EAAWpV,GAAW,EAAIgU,EAAchU,IAElH,CAaI,8BAAOwjB,CAAwB/hB,GAC3B,IACI,MAAMqW,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBnT,EAAMkR,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK8Q,uCAAuC3L,EAAQK,EAAMG,GAC1D,IAAIE,EAAKG,IAAqBb,EAAS,EAAI,GACvC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,OAAO1mB,OAAO2mB,QAAQ,GAAInL,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAiCI,6BAAO9J,CAAuB+L,EAAa/b,EAAS2lB,EAAWnW,EAAQoW,EAAiB/hB,EAAO9B,EAASwE,EAAaD,EAAetJ,EAAK4nB,GACrIpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BkH,EAAOve,EAAYsV,sBAEvB,IAAImJ,EAAO,EACN7N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BgL,EAAO1e,EAAcuV,sBAEzB,IAAIoJ,EAAO9N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjFyL,EAAO5P,EACX,IAAIiP,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKoR,sCAAsC/J,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASoW,EAAiB/hB,EAAOsT,EAAWpV,GAAW,EAAIgU,EAAchU,GAAU+iB,EAAME,EAAMC,EAAMY,EAAMX,GAEvO,CAsCI,gCAAO7V,CAA0B0M,EAAa/b,EAAS2lB,EAAWnW,EAAQgV,EAAaC,EAAYznB,EAAK+E,EAASwE,EAAaD,EAAeoe,EAAiBC,EAAmBC,GAC7KpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBC,EAAOL,EAAW5I,sBAEtB,IAAImJ,EAAO7N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2L,EAAO9P,EACX,IAAIgP,EAAO,EACN9N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BqH,EAAO1e,EAAYsV,sBAEvB,IAAIqJ,EAAO,EACN/N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BkL,EAAO5e,EAAcuV,sBAEzB,IAAImK,EAAO,EACN7O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoI,EAAOtB,EAAgB7I,sBAE3B,IAAIoK,EAAO,EACN9O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiM,EAAOtB,EAAkB9I,sBAE7B,IAAIqK,EAAO,EACN/O,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5Be,EAAOtB,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKyR,yCAAyCpK,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASgV,EAAaM,EAAME,EAAMe,EAAM5O,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUkjB,EAAMC,EAAMc,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqBrK,EAAa/b,EAAS2lB,EAAWnW,EAAQxS,EAAK+E,EAASwE,EAAaD,EAAese,GAC3GpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO3N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2K,EAAO9O,EACX,IAAI+O,EAAO,EACN7N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BoH,EAAOze,EAAYsV,sBAEvB,IAAIoJ,EAAO,EACN9N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BiL,EAAO3e,EAAcuV,sBAEzB,IAAIqJ,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK2R,oCAAoCtK,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASsV,EAAMC,EAAM5N,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUijB,EAAMC,EAAMC,GAE7M,CAeI,0BAAOoB,CAAoBtmB,EAAS2lB,GAChC,IACI,MAAM9L,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACbvB,EAAK6R,mCAAmC1M,EAAQK,EAAMG,EAAMmE,EAAMwC,GAClE,IAAIzG,EAAKG,IAAqBb,EAAS,EAAI,GACvC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,OAAO1mB,OAAO2mB,QAAQ,GAAInL,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CA6BI,2BAAOxJ,CAAqByL,EAAayK,EAAUC,EAAUjC,EAAaC,EAAYznB,EAAK0pB,EAAkBC,EAAoBjC,EAAiBC,EAAmBC,GACjKpL,EAAauC,EAAaC,IAC1BxC,EAAagN,EAAU3B,IACvB,IAAI3K,EAAOsM,EAAS3K,qBACpBrC,EAAaiN,EAAU5B,IACvB,IAAIrG,EAAOiI,EAAS5K,qBACpB,IAAIiJ,EAAO,EACN3N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBC,EAAOL,EAAW5I,sBAEtB,IAAImJ,EAAO7N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2L,EAAO9P,EACX,IAAIgP,EAAO,EACN9N,EAAWuP,KACZlN,EAAakN,EAAkB9I,IAC/BqH,EAAOyB,EAAiB7K,sBAE5B,IAAIqJ,EAAO,EACN/N,EAAWwP,KACZnN,EAAamN,EAAoB3M,IACjCkL,EAAOyB,EAAmB9K,sBAE9B,IAAImK,EAAO,EACN7O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoI,EAAOtB,EAAgB7I,sBAE3B,IAAIoK,EAAO,EACN9O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiM,EAAOtB,EAAkB9I,sBAE7B,IAAIqK,EAAO,EACN/O,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5Be,EAAOtB,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKkS,oCAAoC7K,EAAYzB,UAAWJ,EAAMsE,EAAMgG,EAAaM,EAAME,EAAMe,EAAMd,EAAMC,EAAMc,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOvV,CAAsBoL,EAAa8K,EAAcC,EAAe9pB,EAAK+pB,EAAmBC,EAAqBpC,GAChHpL,EAAauC,EAAaC,IAC1BxC,EAAasN,EAAejC,IAC5B,IAAI3K,EAAO4M,EAAcjL,qBACrB2C,EAAOrH,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACX,IAAI6O,EAAO,EACN3N,EAAW4P,KACZvN,EAAauN,EAAmBnJ,IAChCkH,EAAOiC,EAAkBlL,sBAE7B,IAAImJ,EAAO,EACN7N,EAAW6P,KACZxN,EAAawN,EAAqBhN,IAClCgL,EAAOgC,EAAoBnL,sBAE/B,IAAIoJ,EAAO,EACN9N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BF,EAAOL,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKuS,qCAAqClL,EAAYzB,UAAWuM,EAAc3M,EAAMsE,EAAMwC,EAAM8D,EAAME,EAAMC,GAEjI,CAgCI,+BAAOlU,CAAyBgL,EAAamL,EAAgBjW,EAAWkW,EAAeL,EAAetC,EAAaC,EAAYznB,EAAKoqB,EAAsBC,EAAwB3C,EAAiBC,EAAmBC,GAClNpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB1F,EAAWyD,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACPuI,EAAO7H,EAAkBwQ,EAAezS,EAAKyF,kBAAmBzF,EAAK0F,oBACrE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAW2P,KACZtN,EAAasN,EAAejC,IAC5BC,EAAOgC,EAAcjL,sBAEzB,IAAImJ,EAAO,EACN7N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBG,EAAOP,EAAW5I,sBAEtB,IAAIoJ,EAAO9N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjFyL,EAAO5P,EACX,IAAIiP,EAAO,EACN/N,EAAWiQ,KACZ5N,EAAa4N,EAAsBxJ,IACnCsH,EAAOkC,EAAqBvL,sBAEhC,IAAImK,EAAO,EACN7O,EAAWkQ,KACZ7N,EAAa6N,EAAwBrN,IACrCgM,EAAOqB,EAAuBxL,sBAElC,IAAIoK,EAAO,EACN9O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BqI,EAAOvB,EAAgB7I,sBAE3B,IAAIqK,EAAO,EACN/O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCkM,EAAOvB,EAAkB9I,sBAE7B,IAAIyL,EAAO,EACNnQ,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BmC,EAAO1C,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK6S,wCAAwCxL,EAAYzB,UAAW4M,EAAgBhN,EAAMG,EAAMmE,EAAMwC,EAAM8D,EAAMN,EAAaQ,EAAMC,EAAMY,EAAMX,EAAMc,EAAMC,EAAMC,EAAMoB,GAE7L,CAeI,wBAAOxW,CAAkBiL,EAAa/b,EAAS6Q,EAAarB,EAAQzN,GAChEyX,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkB9F,EAAa6D,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EAEb,OAAOhB,EADKP,EAAK8S,iCAAiCzL,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAAS2H,EAAWpV,GAAW,EAAIgU,EAAchU,IAExK,GAGA,MAAM0lB,GAA0D,oBAAzBpP,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKgT,sBAAsB9R,IAAQ,YAIzE,MAAMpQ,EAEF,aAAOkW,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOnW,EAAWoW,WAGrC,OAFA5F,EAAIsE,UAAY1E,EAChB6R,GAAuBnP,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC7CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBmN,GAAuBlP,WAAW/d,MAC3Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKgT,sBAAsB9R,EACnC,CAWI5L,kBAAAA,GAEI,OAAe,IADH0K,EAAKiT,8BAA8BntB,KAAK8f,UAE5D,CAWIsN,qBAAAA,GAEI,OAAe,IADHlT,EAAKmT,iCAAiCrtB,KAAK8f,UAE/D,CAWIpQ,yBAAAA,GAEI,OAAe,IADHwK,EAAKoT,qCAAqCttB,KAAK8f,UAEnE,CAWIlQ,kBAAAA,GAEI,OAAe,IADHsK,EAAKqT,8BAA8BvtB,KAAK8f,UAE5D,CAWIhQ,iBAAAA,GAEI,OAAe,IADHoK,EAAKsT,6BAA6BxtB,KAAK8f,UAE3D,CAWI9P,iBAAAA,GAEI,OAAe,IADHkK,EAAKuT,6BAA6BztB,KAAK8f,UAE3D,CAWI5P,YAAAA,GAEI,OAAe,IADHgK,EAAKwT,wBAAwB1tB,KAAK8f,UAEtD,CAWI1P,yBAAAA,GAEI,OAAe,IADH8J,EAAKyT,qCAAqC3tB,KAAK8f,UAEnE,CAWIxP,aAAAA,GAEI,OAAe,IADH4J,EAAK0T,yBAAyB5tB,KAAK8f,UAEvD,CAWItP,uBAAAA,GAEI,OAAe,IADH0J,EAAK2T,mCAAmC7tB,KAAK8f,UAEjE,CAWIpP,+BAAAA,GAEI,OAAe,IADHwJ,EAAK4T,2CAA2C9tB,KAAK8f,UAEzE,CAWIlP,sBAAAA,GAEI,OAAe,IADHsJ,EAAK6T,kCAAkC/tB,KAAK8f,UAEhE,CAWIkO,8BAAAA,GAEI,OAAe,IADH9T,EAAK+T,0CAA0CjuB,KAAK8f,UAExE,CAWIhP,+BAAAA,GAEI,OAAe,IADHoJ,EAAKgU,2CAA2CluB,KAAK8f,UAEzE,CAWI9O,oBAAAA,GAEI,OAAe,IADHkJ,EAAKiU,gCAAgCnuB,KAAK8f,UAE9D,CAOIsO,QAAAA,GACI,IAAIrM,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKmU,oBAAoBhP,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsM,IAAAA,GACI,MAAM5T,EAAMR,EAAKqU,gBAAgBvuB,KAAK8f,WACtC,OAAO9U,EAAWkW,OAAOxG,EACjC,CASI,gBAAOzP,CAAUujB,GACb,IACI,MAAMnP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOP,EAAkBqP,EAAOtU,EAAKyF,mBACrCE,EAAOpE,EACbvB,EAAKuU,qBAAqBpP,EAAQK,EAAMG,GACxC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOhV,EAAWkW,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQI,iBAAOze,CAAW6tB,GACd,IACI,MAAMrP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBuS,EAAQxU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKyU,sBAAsBtP,EAAQK,EAAMG,GACzC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOhV,EAAWkW,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/U,OAAAA,GACI,IACI,MAAM8U,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0U,mBAAmBvP,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,IAAI4D,EAAKzO,EAAoBL,EAAIC,GAAI1E,QAErC,OADApB,EAAKgI,gBAAgBnC,EAAS,EAALC,EAAQ,GAC1B6O,CACnB,CAAU,QACE3U,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4U,oBAAoBzP,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM+M,GAAgE,oBAAzBlR,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK8U,4BAA4B5T,IAAQ,YAI/E,MAAMnZ,EAEF,aAAOif,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOlf,EAAiBmf,WAG3C,OAFA5F,EAAIsE,UAAY1E,EAChB2T,GAA6BjR,SAAStC,EAAKA,EAAIsE,UAAWtE,GACnDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBiP,GAA6BhR,WAAW/d,MACjCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK8U,4BAA4B5T,EACzC,CASI,iBAAOva,CAAW+E,GACd,IACI,MAAMyZ,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBvW,EAAQsU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK+U,4BAA4B5P,EAAQK,EAAMG,GAC/C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO/d,EAAiBif,OAAOnB,EAC3C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgV,0BAA0B7P,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIrgB,OAAAA,CAAQggB,GACJ,IACI,MAAMtC,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAa2C,EAAUC,IACvB1H,EAAKiV,yBAAyB9P,EAAQrf,KAAK8f,UAAW6B,EAAS7B,WAC/D,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOqK,GAAgBnJ,OAAOnB,EAC1C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASItd,OAAAA,CAAQ2f,GACJ3C,EAAa2C,EAAUC,IAEvB,OAAe,IADH1H,EAAKkV,yBAAyBpvB,KAAK8f,UAAW6B,EAAS7B,UAE3E,GAGA,MAAMuP,GAA+D,oBAAzBxR,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoV,2BAA2BlU,IAAQ,YAI9E,MAAMvF,EAEF,aAAOqL,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOtL,EAAgBuL,WAG1C,OAFA5F,EAAIsE,UAAY1E,EAChBiU,GAA4BvR,SAAStC,EAAKA,EAAIsE,UAAWtE,GAClDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuP,GAA4BtR,WAAW/d,MAChCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoV,2BAA2BlU,EACxC,CAMIkL,UAAAA,CAAWkD,EAAYN,GACnB,IACI,MAAM7J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBqN,EAAYtP,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EACbvB,EAAKqV,2BAA2BlQ,EAAQrf,KAAK8f,UAAWJ,EAAMG,EAAMmE,EAAMwC,GAC1E,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOwP,EAAMtO,OAAOnB,EAChC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI,iBAAOze,CAAW+E,GACd,IACI,MAAMyZ,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBvW,EAAQsU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKuV,2BAA2BpQ,EAAQK,EAAMG,GAC9C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOnK,EAAgBqL,OAAOnB,EAC1C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwV,yBAAyBrQ,EAAQrf,KAAK8f,WAC3C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI3b,YAAAA,GACI,MAAMqU,EAAMR,EAAKyV,6BAA6B3vB,KAAK8f,WACnD,OAAOvb,OAAO2mB,QAAQ,GAAIxQ,EAClC,CAOI3U,KAAAA,GACI,IAAIgc,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0V,sBAAsBvQ,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI9b,kBAAAA,CAAmBqb,EAAaiI,EAAYN,GACxC,IAAI2G,EACAC,EACJ,IACI,MAAMzQ,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkBqN,EAAYtP,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EACbvB,EAAK6V,mCAAmC1Q,EAAQrf,KAAK8f,UAAWyB,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,GACzG,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GACpC2Q,EAAKlT,IAAkBuC,EAAS,EAAI,GACpCmL,EAAOzK,EACPwL,EAAOvL,EACX,GAAIgQ,EAEA,MADAxF,EAAO,EAAGe,EAAO,EACX9Q,EAAWwQ,GAIrB,OAFA4E,EAAcrF,EACdsF,EAAcvE,EACPpQ,EAAmBqP,EAAMe,EAC5C,CAAU,QACErR,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgB2N,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBpS,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKgW,qBAAqB9U,IAAQ,YAIxE,MAAM+U,EAEF,aAAOjP,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOgP,EAAU/O,WAGpC,OAFA5F,EAAIsE,UAAY1E,EAChB6U,GAAsBnS,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC5CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBmQ,GAAsBlS,WAAW/d,MAC1Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKgW,qBAAqB9U,EAClC,CAWI,WAAOlZ,CAAKqf,EAAapf,GACrB6c,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACPf,EAAMR,EAAKqN,gBAAgBhG,EAAYzB,UAAWJ,EAAMG,GAC9D,OAAOsQ,EAAUjP,OAAOxG,EAChC,CAWItY,MAAAA,CAAOd,EAASa,GACZ6c,EAAa1d,EAASgmB,GACtB,MAAM5H,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EAEb,OAAe,IADHvB,EAAKkW,iBAAiBpwB,KAAK8f,UAAWxe,EAAQwe,UAAWJ,EAAMG,EAEnF,CASI,kBAAOze,CAAYiB,GACf,MAAMqd,EAAOvD,EAAkB9Z,EAAW6X,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACPf,EAAMR,EAAKmW,sBAAsB3Q,EAAMG,GAC7C,OAAOsQ,EAAUjP,OAAOxG,EAChC,CAOIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoW,oBAAoBjR,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMuO,GAA2D,oBAAzB1S,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKsW,uBAAuBpV,IAAQ,YAO1E,MAAMzS,EAEF,aAAOuY,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOxY,EAAYyY,WAGtC,OAFA5F,EAAIsE,UAAY1E,EAChBmV,GAAwBzS,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC9CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjByQ,GAAwBxS,WAAW/d,MAC5Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKsW,uBAAuBpV,EACpC,CASI,iBAAOva,CAAWsE,GACd,IACI,MAAMka,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBhX,EAAa+U,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKuW,uBAAuBpR,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOrX,EAAYuY,OAAOnB,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwW,qBAAqBrR,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI2O,aAAAA,GACI,IAAI5O,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0W,0BAA0BvR,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI6O,eAAAA,GACI,IAAI9O,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4W,4BAA4BzR,EAAQrf,KAAK8f,WAC9C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM+O,GAA4D,oBAAzBlT,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK8W,wBAAwB5V,IAAQ,YAI3E,MAAMlQ,EAEF,aAAOgW,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOjW,EAAakW,WAGvC,OAFA5F,EAAIsE,UAAY1E,EAChB2V,GAAyBjT,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC/CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBiR,GAAyBhT,WAAW/d,MAC7Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK8W,wBAAwB5V,EACrC,CAOI,yBAAOjK,GACH,MAAMuJ,EAAMR,EAAK+W,kCACjB,OAAO/lB,EAAagW,OAAOxG,EACnC,CAOI,4BAAOwW,GACH,MAAMxW,EAAMR,EAAKiX,qCACjB,OAAOjmB,EAAagW,OAAOxG,EACnC,CAOI,gCAAOrJ,GACH,MAAMqJ,EAAMR,EAAKkX,yCACjB,OAAOlmB,EAAagW,OAAOxG,EACnC,CAOI,yBAAOnJ,GACH,MAAMmJ,EAAMR,EAAKmX,kCACjB,OAAOnmB,EAAagW,OAAOxG,EACnC,CAOI,wBAAOjJ,GACH,MAAMiJ,EAAMR,EAAKoX,iCACjB,OAAOpmB,EAAagW,OAAOxG,EACnC,CAOI,wBAAO6W,GACH,MAAM7W,EAAMR,EAAKsX,iCACjB,OAAOtmB,EAAagW,OAAOxG,EACnC,CAOI,mBAAO/I,GACH,MAAM+I,EAAMR,EAAKuX,4BACjB,OAAOvmB,EAAagW,OAAOxG,EACnC,CAOI,gCAAO7I,GACH,MAAM6I,EAAMR,EAAKwX,yCACjB,OAAOxmB,EAAagW,OAAOxG,EACnC,CAOI,oBAAO3I,GACH,MAAM2I,EAAMR,EAAKyX,6BACjB,OAAOzmB,EAAagW,OAAOxG,EACnC,CAOI,8BAAOzI,GACH,MAAMyI,EAAMR,EAAK0X,uCACjB,OAAO1mB,EAAagW,OAAOxG,EACnC,CAOI,sCAAOvI,GACH,MAAMuI,EAAMR,EAAK2X,+CACjB,OAAO3mB,EAAagW,OAAOxG,EACnC,CAOI,6BAAOrI,GACH,MAAMqI,EAAMR,EAAK4X,sCACjB,OAAO5mB,EAAagW,OAAOxG,EACnC,CAOI,qCAAOqX,GACH,MAAMrX,EAAMR,EAAK8X,8CACjB,OAAO9mB,EAAagW,OAAOxG,EACnC,CAOI,sCAAOnI,GACH,MAAMmI,EAAMR,EAAK+X,+CACjB,OAAO/mB,EAAagW,OAAOxG,EACnC,CAOI,2BAAOjI,GACH,MAAMiI,EAAMR,EAAKgY,oCACjB,OAAOhnB,EAAagW,OAAOxG,EACnC,CAOIjL,oBAAAA,GAEI,OAAe,IADHyK,EAAKiY,kCAAkCnyB,KAAK8f,UAEhE,CAOIsS,uBAAAA,GAEI,OAAe,IADHlY,EAAKmY,qCAAqCryB,KAAK8f,UAEnE,CAOInQ,2BAAAA,GAEI,OAAe,IADHuK,EAAKoY,yCAAyCtyB,KAAK8f,UAEvE,CAOIjQ,oBAAAA,GAEI,OAAe,IADHqK,EAAKqY,kCAAkCvyB,KAAK8f,UAEhE,CAOI/P,mBAAAA,GAEI,OAAe,IADHmK,EAAKsY,iCAAiCxyB,KAAK8f,UAE/D,CAOI7P,mBAAAA,GAEI,OAAe,IADHiK,EAAKuY,iCAAiCzyB,KAAK8f,UAE/D,CAOI3P,cAAAA,GAEI,OAAe,IADH+J,EAAKwY,4BAA4B1yB,KAAK8f,UAE1D,CAOIzP,2BAAAA,GAEI,OAAe,IADH6J,EAAKyY,yCAAyC3yB,KAAK8f,UAEvE,CAOIvP,eAAAA,GAEI,OAAe,IADH2J,EAAK0Y,6BAA6B5yB,KAAK8f,UAE3D,CAOIrP,yBAAAA,GAEI,OAAe,IADHyJ,EAAK2Y,uCAAuC7yB,KAAK8f,UAErE,CAOInP,iCAAAA,GAEI,OAAe,IADHuJ,EAAK4Y,+CAA+C9yB,KAAK8f,UAE7E,CAOIjP,wBAAAA,GAEI,OAAe,IADHqJ,EAAK6Y,sCAAsC/yB,KAAK8f,UAEpE,CAOIkT,gCAAAA,GAEI,OAAe,IADH9Y,EAAK+Y,8CAA8CjzB,KAAK8f,UAE5E,CAOI/O,iCAAAA,GAEI,OAAe,IADHmJ,EAAKgZ,+CAA+ClzB,KAAK8f,UAE7E,CAOI7O,sBAAAA,GAEI,OAAe,IADHiJ,EAAKiZ,oCAAoCnzB,KAAK8f,UAElE,CAOIsO,QAAAA,GACI,IAAIrM,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKkZ,sBAAsB/T,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsM,IAAAA,GACI,MAAM5T,EAAMR,EAAKmZ,kBAAkBrzB,KAAK8f,WACxC,OAAO5U,EAAagW,OAAOxG,EACnC,CASI,gBAAOzP,CAAUujB,GACb,IACI,MAAMnP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOP,EAAkBqP,EAAOtU,EAAKyF,mBACrCE,EAAOpE,EACbvB,EAAKoZ,uBAAuBjU,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO9U,EAAagW,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI,iBAAOze,CAAW6tB,GACd,IACI,MAAMrP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBuS,EAAQxU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKqZ,wBAAwBlU,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO9U,EAAagW,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/U,OAAAA,GACI,IACI,MAAM8U,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsZ,qBAAqBnU,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,IAAI4D,EAAKzO,EAAoBL,EAAIC,GAAI1E,QAErC,OADApB,EAAKgI,gBAAgBnC,EAAS,EAALC,EAAQ,GAC1B6O,CACnB,CAAU,QACE3U,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKuZ,sBAAsBpU,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0R,GAAuD,oBAAzB7V,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKyZ,mBAAmBvY,IAAQ,YAGtE,MAAM9a,EAEF,aAAO4gB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO7gB,EAAQ8gB,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChBsY,GAAoB5V,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB4T,GAAoB3V,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKyZ,mBAAmBvY,EAChC,CASI,uBAAO7a,CAAiBghB,GACpBvC,EAAauC,EAAaC,IAC1B,MAAM9G,EAAMR,EAAKiN,uBAAuB5F,EAAYzB,WACpD,OAAOxf,EAAQ4gB,OAAOxG,EAC9B,CASI,kBAAOtZ,CAAYugB,GACf,MAAMjC,EAAOvD,EAAkBwF,EAAUzH,EAAKyF,kBAAmBzF,EAAK0F,oBAChEC,EAAOpE,EACPf,EAAMR,EAAK0Z,oBAAoBlU,EAAMG,GAC3C,OAAOvf,EAAQ4gB,OAAOxG,EAC9B,CAOIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK2Z,kBAAkBxU,EAAQrf,KAAK8f,WACpC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIoF,UAAAA,GACI,MAAM1M,EAAMR,EAAK2H,sBAAsB7hB,KAAK8f,WAC5C,OAAOwH,EAAQpG,OAAOxG,EAC9B,CASI/Y,OAAAA,CAAQjB,GACJ,IAAIozB,EACAC,EACJ,IACI,MAAM1U,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBzb,EAAYwZ,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAK8Z,gBAAgB3U,EAAQrf,KAAK8f,UAAWJ,EAAMG,GACnD,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GACpC2Q,EAAKlT,IAAkBuC,EAAS,EAAI,GACpCiL,EAAOvK,EACPwK,EAAOvK,EACX,GAAIgQ,EAEA,MADA1F,EAAO,EAAGC,EAAO,EACX9P,EAAWwQ,GAIrB,OAFA6I,EAAcxJ,EACdyJ,EAAcxJ,EACPpP,EAAmBmP,EAAMC,EAC5C,CAAU,QACErQ,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgB4R,EAAaC,EAAa,EAC3D,CACA,GAGAzxB,eAAe2xB,EAAWxa,EAAQlS,GAC9B,GAAwB,mBAAb2sB,UAA2Bza,aAAkBya,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB3a,EAAQlS,EAEtE,CAAc,MAAOrH,GACL,GAA0C,oBAAtCuZ,EAAOvW,QAAQX,IAAI,gBAInB,MAAMrC,EAHNC,QAAQoG,KAAK,oMAAqMrG,EAKtO,CAGQ,MAAMsuB,QAAc/U,EAAO/P,cAC3B,aAAayqB,YAAYE,YAAY7F,EAAOjnB,EAEpD,CAAW,CACH,MAAM0X,QAAiBkV,YAAYE,YAAY5a,EAAQlS,GAEvD,OAAI0X,aAAoBkV,YAAYG,SACzB,CAAErV,WAAUxF,UAGZwF,CAEnB,CACA,CAEA,SAASsV,IACL,MAAMhtB,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQitB,IAAIC,2BAA6B,SAASnW,GAC9C7D,EAAW6D,EACnB,EACI/W,EAAQitB,IAAIE,2BAA6B,WAAa,OAAOhU,GAAY,WAErE,OAAOnF,EADK,IAAIoZ,eAExB,GAAOC,UAAU,EACbrtB,EAAQitB,IAAIK,wCAA0C,WAAa,OAAOnU,GAAY,SAAUpC,EAAMC,EAAMO,GACxGzE,EAAUiE,GAAMwW,iBAAiB3Z,EAAmBoD,EAAMO,GAClE,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIO,4BAA8B,WAAa,OAAOrU,GAAY,SAAUpC,EAAMC,EAAMO,EAAMgC,EAAMkU,EAAMC,GAC9G5a,EAAUiE,GAAM4W,KAAK/Z,EAAmBoD,EAAMO,GAAO3D,EAAmB2F,EAAMkU,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACbrtB,EAAQitB,IAAIW,4BAA8B,WAAa,OAAOzU,GAAY,SAAUpC,GAChFjE,EAAUiE,GAAM8W,MACxB,GAAOR,UAAU,EACbrtB,EAAQitB,IAAIa,gCAAkC,WAAa,OAAO3U,GAAY,SAAUpC,GAEpF,OAAO/C,EADKlB,EAAUiE,GAAM5b,SAEpC,GAAOkyB,UAAU,EACbrtB,EAAQitB,IAAIc,8BAAgC,WAAa,OAAO5U,GAAY,SAAUpC,GAElF,OADYjE,EAAUiE,GAAMzb,MAEpC,GAAO+xB,UAAU,EACbrtB,EAAQitB,IAAIe,2BAA6B,WAErC,OAAOha,EADK,IAAI1S,OAExB,EACItB,EAAQitB,IAAIgB,sBAAwB,SAASlX,EAAMC,GAE/C,OAAOhD,EADKJ,EAAmBmD,EAAMC,GAE7C,EACIhX,EAAQitB,IAAIiB,2BAA6B,WAAa,OAAO/U,GAAY,SAAUpC,EAAMC,EAAMO,GAE3F,OADY4W,QAAQprB,IAAI+P,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,GAE5E,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAImB,2BAA6B,WAAa,OAAOjV,GAAY,WAErE,OAAOnF,EADK,IAAIqa,QAExB,GAAOhB,UAAU,EACbrtB,EAAQitB,IAAIqB,4BAA8B,SAASvX,GAE/C,OAAO/C,EADKlB,EAAUiE,GAE9B,EACI/W,EAAQitB,IAAIsB,2BAA6B,WAAa,OAAOpV,GAAY,WAErE,OAAOnF,EADK,IAAIwa,gBAExB,GAAOnB,UAAU,EACbrtB,EAAQitB,IAAIwB,8BAAgC,SAAS1X,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAM2X,OAEpC,EACI1uB,EAAQitB,IAAI0B,8BAAgC,WAAa,OAAOxV,GAAY,SAAUpC,EAAMC,EAAMO,EAAMgC,EAAMkU,GAC1G3a,EAAUiE,GAAM6X,OAAOhb,EAAmBoD,EAAMO,GAAO3D,EAAmB2F,EAAMkU,GACxF,GAAOJ,UAAU,EACbrtB,EAAQitB,IAAI4B,2CAA6C,SAAS9X,GAC9D,IAAI+X,EACJ,IACIA,EAAShc,EAAUiE,aAAiB4V,QAChD,CAAU,MAAOxW,GACL2Y,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI9uB,EAAQitB,IAAI8B,8BAAgC,SAAShY,GAEjD,OADYjE,EAAUiE,GAAMzb,MAEpC,EACI0E,EAAQitB,IAAI+B,2BAA6B,SAASjY,EAAMC,GACpD,MACMyF,EAAO7H,EADD9B,EAAUkE,GAAM/b,IACQ0X,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIgC,+BAAiC,SAASlY,GAElD,OAAO/C,EADKlB,EAAUiE,GAAMpb,QAEpC,EACIqE,EAAQitB,IAAIiC,gCAAkC,WAE1C,OAAOlb,EADKmb,OAAOC,SAE3B,EACIpvB,EAAQitB,IAAIoC,2BAA6B,WAAa,OAAOlW,GAAY,SAAUpC,EAAMC,GAErF,OAAOhD,EADKma,QAAQnzB,IAAI8X,EAAUiE,GAAOjE,EAAUkE,IAE3D,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIqC,uBAAyB,SAASvY,GAE1C,MADwC,mBAArBjE,EAAUiE,EAErC,EACI/W,EAAQitB,IAAIsC,4BAA8B,WAAa,OAAOpW,GAAY,SAAUpC,EAAMC,GAEtF,OAAOhD,EADKlB,EAAUiE,GAAMhB,KAAKjD,EAAUkE,IAEnD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIuC,qBAAuB,SAASzY,GACxC,MAAMrB,EAAM5C,EAAUiE,GAEtB,MAD4B,iBAATrB,GAA6B,OAARA,CAEhD,EACI1V,EAAQitB,IAAIwC,4BAA8B,SAAS1Y,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAM2Y,KAEpC,EACI1vB,EAAQitB,IAAI0C,4BAA8B,WAAa,OAAOxW,GAAY,SAAUpC,GAEhF,OAAO/C,EADKlB,EAAUiE,GAAM2Y,OAEpC,GAAOrC,UAAU,EACbrtB,EAAQitB,IAAI2C,4BAA8B,SAAS7Y,GAE/C,OADYjE,EAAUiE,GAAM8Y,IAEpC,EACI7vB,EAAQitB,IAAI6C,6BAA+B,SAAS/Y,GAEhD,OAAO/C,EADKlB,EAAUiE,GAAMzY,MAEpC,EACI0B,EAAQitB,IAAI8C,6BAA+B,SAAShZ,GAChDjE,EAAUiE,GAAMiZ,OACxB,EACIhwB,EAAQitB,IAAIgD,iCAAmC,WAAa,OAAO9W,GAAY,SAAUpC,GAErF,OAAO/C,EADKiC,KAAKC,UAAUpD,EAAUiE,IAE7C,GAAOsW,UAAU,EACbrtB,EAAQitB,IAAIiD,sBAAwB,SAASnZ,EAAMC,GAC/C,MAAM/C,EAAMnB,EAAUkE,GAChB7D,EAAsB,iBAATc,EAAoBA,OAAMjM,EAC7C,IAAIyU,EAAOrH,EAAWjC,GAAO,EAAIyB,EAAkBzB,EAAKR,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACXqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIkD,4BAA8B,SAASpZ,GAE/C,OAAO/C,EADKoc,EAAkBzW,OAAO5C,GAE7C,EACI/W,EAAQitB,IAAIoD,4BAA8B,WAAa,OAAOlX,GAAY,SAAUpC,EAAMC,EAAMO,GAE5F,OAAOvD,EADKlB,EAAUiE,GAAMhB,KAAKjD,EAAUkE,GAAOlE,EAAUyE,IAEpE,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIqD,2BAA6B,SAASvZ,EAAMC,GACpDpe,QAAQiU,IAAI+G,EAAmBmD,EAAMC,GAC7C,EACIhX,EAAQitB,IAAIsD,qCAAuC,SAASxZ,GAExD,OAAO/C,EADK,IAAIvX,MAAMsa,IAAS,GAEvC,EACI/W,EAAQitB,IAAIuD,2BAA6B,SAASzZ,EAAMC,EAAMO,GAC1DzE,EAAUiE,GAAMC,IAAS,GAAK9D,EAAWqE,EACjD,EACIvX,EAAQitB,IAAIwD,sBAAwB,SAAS1Z,GAEzC,OAAO/C,EADK0c,GAAY/W,OAAO5C,GAEvC,EACI/W,EAAQitB,IAAI0D,2BAA6B,SAAS5Z,GAE9C,OAAO/C,EADKhX,OAAO2mB,QAAQ,GAAI5M,GAEvC,EACI/W,EAAQitB,IAAI2D,kBAAoB,SAAS7Z,GAErC,OAAO/C,EADK0H,GAAQ/B,OAAO5C,GAEnC,EACI/W,EAAQitB,IAAI4D,kBAAoB,WAE5B,OAAO7c,EADK8c,EAAWC,uBAE/B,EACI/wB,EAAQitB,IAAI+D,kBAAoB,WAE5B,OAAOhd,EADKrB,EAAKR,OAEzB,EACInS,EAAQitB,IAAIgE,mCAAqC,SAASla,EAAMC,EAAMO,EAAMgC,GAExE,OAAOvF,EADK/B,EAAYa,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,GAAOgC,IAAS,GAE5F,EACIvZ,EAAQitB,IAAIiE,mBAAqB,SAASna,GACtC,MAAM9C,EAAMf,EAAW6D,GAAMM,SAC7B,GAAiB,GAAbpD,EAAIiD,MAEJ,OADAjD,EAAI2C,EAAI,GACD,EAGX,OADY,CAEpB,EACI5W,EAAQitB,IAAIkE,2BAA6B,WAErC,OAAOnd,EADK,IAAIvX,MAExB,EACIuD,EAAQitB,IAAImE,4BAA8B,SAASra,EAAMC,GAErD,OADYlE,EAAUiE,GAAMlY,KAAKiU,EAAUkE,GAEnD,EACIhX,EAAQitB,IAAIoE,mCAAqC,WAAa,OAAOlY,GAAY,SAAUpC,GAEvF,OAAO/C,EADKlB,EAAUiE,GAAM5U,cAEpC,GAAOkrB,UAAU,EACbrtB,EAAQitB,IAAIqE,2BAA6B,SAASva,GAE9C,OAAO/C,EADK,IAAI5R,WAAW0Q,EAAUiE,IAE7C,EACI/W,EAAQitB,IAAIsE,8BAAgC,SAASxa,GAEjD,OADYjE,EAAUiE,GAAMxZ,MAEpC,EACIyC,EAAQitB,IAAIuE,2BAA6B,SAASza,EAAMC,GACpD,IACI,IAAIya,EAAS,CAAC7a,EAAGG,EAAMF,EAAGG,GAU1B,MAAM7D,EAAM,IAAItL,SATN6pB,CAAC3a,EAAMC,KACb,MAAMJ,EAAI6a,EAAO7a,EACjB6a,EAAO7a,EAAI,EACX,IACI,OAAO0C,EAAkB1C,EAAG6a,EAAO5a,EAAGE,EAAMC,EAChE,CAAkB,QACEya,EAAO7a,EAAIA,CAC/B,KAGY,OAAO5C,EAAcb,EACjC,CAAU,QACEse,EAAO7a,EAAI6a,EAAO5a,EAAI,CAClC,CACA,EACI7W,EAAQitB,IAAI0E,sBAAwB,SAAS5a,GAEzC,OAAO/C,EADK+C,EAEpB,EACI/W,EAAQitB,IAAI2E,2BAA6B,WAErC,OAAO5d,EADK,IAAIlb,MAExB,EACIkH,EAAQitB,IAAI4E,6BAA+B,SAAS9a,EAAMC,GACtD,MACMyF,EAAO7H,EADD9B,EAAUkE,GAAMZ,MACQzD,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAI6E,6BAA+B,SAAS/a,EAAMC,GACtD,IAAI+a,EACAC,EACJ,IACID,EAAchb,EACdib,EAAchb,EACdpe,QAAQC,MAAM+a,EAAmBmD,EAAMC,GACnD,CAAU,QACErE,EAAKgI,gBAAgBoX,EAAaC,EAAa,EAC3D,CACA,EACIhyB,EAAQitB,IAAIgF,8BAAgC,SAASlb,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAMpD,OAEpC,EACI3T,EAAQitB,IAAIiF,kDAAoD,SAASnb,EAAMC,EAAMO,GAEjF,OAAOvD,EADK,IAAI5R,WAAW0Q,EAAUiE,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACIvX,EAAQitB,IAAIkF,sCAAwC,WAAa,OAAOhZ,GAAY,SAAUpC,EAAMC,GAChGlE,EAAUiE,GAAMqb,eAAelf,EAAW8D,GAClD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIoF,gCAAkC,SAAStb,EAAMC,EAAMO,GAE/D,OAAOvD,EADKlB,EAAUiE,GAAMhC,SAASiC,IAAS,EAAGO,IAAS,GAElE,EACIvX,EAAQitB,IAAIqF,uCAAyC,WAAa,OAAOnZ,GAAY,SAAUpC,EAAMC,GACjGlE,EAAUiE,GAAMwb,gBAAgBzf,EAAUkE,GAClD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIuF,2BAA6B,SAASzb,EAAMC,EAAMO,GAC1DzE,EAAUiE,GAAMhU,IAAI+P,EAAUkE,GAAOO,IAAS,EACtD,EACIvX,EAAQitB,IAAIwF,8BAAgC,SAAS1b,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAM2b,OAEpC,EACI1yB,EAAQitB,IAAI0F,+BAAiC,SAAS5b,GAElD,OAAO/C,EADKlB,EAAUiE,GAAM6b,QAEpC,EACI5yB,EAAQitB,IAAI4F,gCAAkC,SAAS9b,GAEnD,OAAO/C,EADKlB,EAAUiE,GAAM+b,SAEpC,EACI9yB,EAAQitB,IAAI8F,4BAA8B,SAAShc,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAMic,KAEpC,EACIhzB,EAAQitB,IAAIgG,qBAAuB,SAASlc,GAExC,MADwC,iBAArBjE,EAAUiE,EAErC,EACI/W,EAAQitB,IAAIiG,+BAAiC,WAAa,OAAO/Z,GAAY,WAEzE,OAAOnF,EADK9B,OAAOihB,QAE3B,GAAO9F,UAAU,EACbrtB,EAAQitB,IAAImG,gCAAkC,SAASrc,GAEnD,OAAO/C,EADKlB,EAAUiE,GAAMsc,SAEpC,EACIrzB,EAAQitB,IAAIqG,qCAAuC,SAASvc,GAExD,OAAO/C,EADK,IAAI5R,WAAW2U,IAAS,GAE5C,EACI/W,EAAQitB,IAAIsG,8BAAgC,SAASxc,GAEjD,OADYjE,EAAUiE,GAAMxZ,MAEpC,EACIyC,EAAQitB,IAAIuG,2BAA6B,SAASzc,EAAMC,GAEpD,OAAOhD,EADKlB,EAAUiE,GAAMC,IAAS,GAE7C,EACIhX,EAAQitB,IAAIwG,4BAA8B,WAAa,OAAOta,GAAY,WAEtE,OAAOnF,EADK0f,KAAKA,KAEzB,GAAOrG,UAAU,EACbrtB,EAAQitB,IAAI0G,8BAAgC,WAAa,OAAOxa,GAAY,WAExE,OAAOnF,EADK4f,OAAOA,OAE3B,GAAOvG,UAAU,EACbrtB,EAAQitB,IAAI4G,kCAAoC,WAAa,OAAO1a,GAAY,WAE5E,OAAOnF,EADK8f,WAAWA,WAE/B,GAAOzG,UAAU,EACbrtB,EAAQitB,IAAI8G,8BAAgC,WAAa,OAAO5a,GAAY,WAExE,OAAOnF,EADKggB,OAAOA,OAE3B,GAAO3G,UAAU,EACbrtB,EAAQitB,IAAIgH,wBAA0B,SAASld,GAE3C,YADgC/O,IAApB8K,EAAUiE,EAE9B,EACI/W,EAAQitB,IAAIiH,iCAAmC,SAASnd,EAAMC,GAE1D,OAAOhD,EADK,IAAImgB,SAASvgB,EAAmBmD,EAAMC,IAE1D,EACIhX,EAAQitB,IAAImH,2BAA6B,WAAa,OAAOjb,GAAY,SAAUpC,EAAMC,GAErF,OADYmX,QAAQjrB,IAAI4P,EAAUiE,GAAOjE,EAAUkE,GAE3D,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIoH,6BAA+B,SAAStd,GAEhD,OAAO/C,EADK5Y,MAAM0X,EAAUiE,IAEpC,EACI/W,EAAQitB,IAAIqH,6BAA+B,SAASvd,EAAMC,GAEtD,OAAOhD,EADKlB,EAAUiE,GAAM3b,MAAM0X,EAAUkE,IAEpD,EACIhX,EAAQitB,IAAIsH,wBAA0B,SAASxd,EAAMC,GACjD,MACMyF,EAAO7H,EADDa,EAAY3C,EAAUkE,IACErE,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIuH,iBAAmB,SAASzd,EAAMC,GAC1C,MAAM,IAAIle,MAAM8a,EAAmBmD,EAAMC,GACjD,EACIhX,EAAQitB,IAAIwH,mBAAqB,SAAS1d,GACtC,MAAM7D,EAAW6D,EACzB,EACI/W,EAAQitB,IAAIyH,4BAA8B,SAAS3d,EAAMC,EAAMO,GAE3D,OAAOvD,EADKlB,EAAUiE,GAAM4d,KAAK7hB,EAAUkE,GAAOlE,EAAUyE,IAEpE,EACIvX,EAAQitB,IAAI2H,4BAA8B,SAAS7d,EAAMC,GAErD,OAAOhD,EADKlB,EAAUiE,GAAM4d,KAAK7hB,EAAUkE,IAEnD,EACIhX,EAAQitB,IAAI4H,sCAAwC,SAAS9d,GACzD+d,eAAehiB,EAAUiE,GACjC,EACI/W,EAAQitB,IAAI8H,sCAAwC,SAAShe,GAEzD,OAAO/C,EADKlB,EAAUiE,GAAM+d,eAEpC,EACI90B,EAAQitB,IAAI+H,+BAAiC,SAASje,GAElD,OAAO/C,EADKnM,QAAQC,QAAQgL,EAAUiE,IAE9C,EACI/W,EAAQitB,IAAIgI,iCAAmC,WAE3C,OAAOjhB,EADKkhB,QAAQC,UAE5B,EACIn1B,EAAQitB,IAAImI,2BAA6B,SAASre,GAE9C,OAAO/C,EADK,IAAIwB,WAAW1C,EAAUiE,IAE7C,EACI/W,EAAQitB,IAAIoI,iCAAmC,SAASte,EAAMC,EAAMO,GAEhE,OAAOvD,EADKkhB,QAAQC,UAAUriB,EAAUiE,GAAOC,EAAMO,GAE7D,EACIvX,EAAQitB,IAAIqI,6BAA+B,SAASve,GAEhD,OADYjE,EAAUiE,GAAMhc,KAEpC,EACIiF,EAAQitB,IAAIsI,6BAA+B,SAASxe,GAEhD,OAAO/C,EADKlB,EAAUiE,GAAMzY,MAEpC,EACI0B,EAAQitB,IAAIuI,iCAAmC,SAASze,GACpD,MAOM0F,EAAO7H,EAPD,+BAAiC6gB,mBAAoB,6OAO7B9iB,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIyI,2BAA6B,WAAa,OAAOvc,GAAY,SAAUpC,EAAMC,GAErF,OAAOhD,EADK,IAAIjI,OAAO6H,EAAmBmD,EAAMC,IAExD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAI0I,oCAAsC,SAAS5e,EAAMC,GAC7DlE,EAAUiE,GAAM6e,UAAY9iB,EAAUkE,EAC9C,EACIhX,EAAQitB,IAAI4I,0BAA4B,SAAS9e,EAAMC,EAAMO,GAEzD,OAAOvD,EADKvX,MAAMq5B,GAAGhjB,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,IAEzE,EACIvX,EAAQitB,IAAI8I,mCAAqC,WAAa,OAAO5c,GAAY,SAAUpC,EAAMC,GAC7FlE,EAAUiE,GAAMrE,YAAYI,EAAUkE,GAC9C,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAI+I,4BAA8B,SAASjf,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAM7U,KAEpC,EACIlC,EAAQitB,IAAIgJ,yCAA2C,WAAa,OAAO9c,GAAY,SAAUpC,EAAMC,EAAMO,GAEzG,OAAOvD,EADK,IAAIkiB,QAAQtiB,EAAmBmD,EAAMC,GAAOlE,EAAUyE,IAE1E,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIkJ,oCAAsC,WAAa,OAAOhd,GAAY,SAAUpC,EAAMC,GAC9F,MAAM7D,EAAML,EAAUkE,GAAMof,aAC5B,IAAI3Z,EAAOrH,EAAWjC,GAAO,EAAIyB,EAAkBzB,EAAKR,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACXqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,GAAO4Q,UAAU,EACbrtB,EAAQitB,IAAIoJ,+BAAiC,SAAStf,EAAMC,EAAMO,GAE9D,OAAOvD,EADK8C,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACItX,EAAQitB,IAAIqJ,+BAAiC,SAASvf,EAAMC,EAAMO,GAE9D,OAAOvD,EADK8C,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWtX,CACX,CAEA,SAASu2B,EAAkBv2B,EAASw2B,GAChCx2B,EAAQitB,IAAI9a,OAASqkB,GAAgB,IAAI5J,YAAY6J,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoBnf,EAAUxF,GAQnC,OAPAS,EAAO+E,EAASof,QAChBhG,EAAWC,uBAAyB7e,EACpCwG,EAAwB,KACxBpD,EAAqB,KACrB7B,EAAqB,KAErBd,EAAKokB,mBACEpkB,CACX,CAEA,SAASqkB,EAAS9kB,EAAQskB,GACtB,QAAaxuB,IAAT2K,EAAoB,OAAOA,EAE/B,MAAM3S,EAAUgtB,IAEhBuJ,EAAkBv2B,EAASw2B,GAErBtkB,aAAkB0a,YAAYqK,SAChC/kB,EAAS,IAAI0a,YAAYqK,OAAO/kB,IAKpC,OAAO2kB,EAFU,IAAIjK,YAAYG,SAAS7a,EAAQlS,GAEbkS,EACzC,CAEAnX,eAAe+1B,EAAWoG,EAAOV,GAC7B,QAAaxuB,IAAT2K,EAAoB,OAAOA,EAG/B,MAAM3S,EAAUgtB,KAEK,iBAAVkK,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARlqB,KAAsBkrB,aAAiBlrB,OAC3IkrB,EAAQ97B,MAAM87B,IAGlBX,EAAkBv2B,EAASw2B,GAE3B,MAAM,SAAE9e,EAAQ,OAAExF,SAAiBwa,QAAiBwK,EAAOl3B,GAE3D,OAAO62B,EAAoBnf,EAAUxF,EACzC,CAEA,IAAI4kB,EAAuBx1B,OAAO61B,OAAO,CACrCC,UAAW,KACXn+B,QAAS8mB,EACT/E,UAAWhD,EACXqD,kBAAmB+U,EACnBjU,MAAO8L,EACPvM,QAASA,GACT/J,SAAU0lB,GACV1Y,aAAcyE,GACd7pB,WAAY0gB,GACZ5gB,qBAAsB+mB,GACtBhhB,QAAS8Y,GACThM,eAAgBkB,GAChB3J,WAAYoY,GACZnhB,iBAAkB48B,GAClBhpB,gBAAiBwU,GACjB8F,UAAWhO,GACXxZ,YAAasvB,GACb/sB,aAAcsU,GACdlf,QAASshB,GACTkd,QAASzG,EACTkG,SAAUA,EACV9d,eAAgBF,EAChBF,eAAgBA,EAChBzH,wBAAyBwG,IAG7B,MAAM2f,GAAY,wBC57Ib,MACDte,eAAgBue,GAAkB,QAClCx+B,GAAO,UACP+hB,GAAS,kBACTK,GAAiB,MACjBc,GAAK,SACLxK,GAAQ,aACRgN,GAAY,QACZ+Y,GAAO,WACPn+B,GAAU,qBACVF,GAAoB,QACpB+F,GAAO,WACPqE,GAAU,iBACV/I,GAAgB,gBAChB4T,GAAe,eACfpC,GAAc,UACd0c,GAAS,YACTxnB,GAAW,QACXrI,GAAO,aACP4K,GAAY,wBACZ0N,SD26IoBtW,OAAO48B,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY/hB,KAAKiiB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAehH,EAAYiH,SAG3BjH,EAAWiH,GAGdjB,CAAO,EC97IpBkB,CAAK,CACXJ,WAAYA,IACD,IAAI5rB,IAAI,eAIvBjR,eAAeme,EAAe+e,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBv/B,QAAQw/B,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIzrB,IAAI,aAA+BisB,EACpE,6DChCA,MAAMI,EAAclJ,OAAO,iBACrBmJ,EAAiBnJ,OAAO,oBACxBoJ,EAAepJ,OAAO,wBACtBqJ,EAAYrJ,OAAO,qBACnBsJ,EAActJ,OAAO,kBACrBuJ,EAAYhjB,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEijB,EAAmB,IAAIr2B,IAAI,CAC7B,CAAC,QA7CwB,CACzBs2B,UAAYljB,GAAQgjB,EAAShjB,IAAQA,EAAI2iB,GACzC,SAAAQ,CAAU5kB,GACN,MAAM,MAAE6kB,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAC,EAAOhlB,EAAK6kB,GACL,CAACC,EAAO,CAACA,GACpB,EACAG,YAAYC,IACRA,EAAKz8B,QACEuP,EAAKktB,MAqChB,CAAC,QA/BwB,CACzBP,UAAYt6B,GAAUo6B,EAASp6B,IAAUm6B,KAAen6B,EACxD,SAAAu6B,EAAU,MAAEv6B,IACR,IAAI86B,EAcJ,OAZIA,EADA96B,aAAiBxF,MACJ,CACTugC,SAAS,EACT/6B,MAAO,CACH1D,QAAS0D,EAAM1D,QACf6G,KAAMnD,EAAMmD,KACZ2U,MAAO9X,EAAM8X,QAKR,CAAEijB,SAAS,EAAO/6B,SAE5B,CAAC86B,EAAY,GACxB,EACA,WAAAF,CAAYE,GACR,GAAIA,EAAWC,QACX,MAAM/3B,OAAOC,OAAO,IAAIzI,MAAMsgC,EAAW96B,MAAM1D,SAAUw+B,EAAW96B,OAExE,MAAM86B,EAAW96B,KACrB,MAoBJ,SAAS26B,EAAOhlB,EAAKqlB,EAAKxF,WAAYyF,EAAiB,CAAC,MACpDD,EAAGlnB,iBAAiB,WAAW,SAASonB,EAASC,GAC7C,IAAKA,IAAOA,EAAGv3B,KACX,OAEJ,IAhBR,SAAyBq3B,EAAgBG,GACrC,IAAK,MAAMC,KAAiBJ,EAAgB,CACxC,GAAIG,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBP,EAAgBE,EAAGC,QAEpC,YADA9gC,QAAQoG,KAAK,mBAAmBy6B,EAAGC,6BAGvC,MAAM,GAAE54B,EAAE,KAAEnD,EAAI,KAAEo8B,GAASz4B,OAAOC,OAAO,CAAEw4B,KAAM,IAAMN,EAAGv3B,MACpD83B,GAAgBP,EAAGv3B,KAAK83B,cAAgB,IAAIz/B,IAAI0/B,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASJ,EAAKhmB,MAAM,GAAI,GAAGqmB,QAAO,CAACnmB,EAAKomB,IAASpmB,EAAIomB,IAAOpmB,GAC5DqmB,EAAWP,EAAKK,QAAO,CAACnmB,EAAKomB,IAASpmB,EAAIomB,IAAOpmB,GACvD,OAAQtW,GACJ,IAAK,MAEGu8B,EAAcI,EAElB,MACJ,IAAK,MAEGH,EAAOJ,EAAKhmB,OAAO,GAAG,IAAMkmB,EAAcR,EAAGv3B,KAAK5D,OAClD47B,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcI,EAASlhB,MAAM+gB,EAAQH,GAEzC,MACJ,IAAK,YAGGE,EA6KxB,SAAejmB,GACX,OAAO3S,OAAOC,OAAO0S,EAAK,CAAE,CAACokB,IAAc,GAC/C,CA/KsCkC,CADA,IAAID,KAAYN,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAElB,EAAK,MAAEC,GAAU,IAAIC,eAC7BC,EAAOhlB,EAAK8kB,GACZmB,EAkKxB,SAAkBjmB,EAAKumB,GAEnB,OADAC,EAAc13B,IAAIkR,EAAKumB,GAChBvmB,CACX,CArKsCvE,CAASopB,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGoB,OAAclyB,EAElB,MACJ,QACI,OAEZ,CACA,MAAO1J,GACH47B,EAAc,CAAE57B,QAAO,CAACm6B,GAAc,EAC1C,CACA5wB,QAAQC,QAAQoyB,GACXQ,OAAOp8B,IACD,CAAEA,QAAO,CAACm6B,GAAc,MAE9B9D,MAAMuF,IACP,MAAOS,EAAWC,GAAiBC,EAAYX,GAC/CZ,EAAG5mB,YAAYpR,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGo5B,GAAY,CAAE75B,OAAO85B,GACvD,YAATj9B,IAEA27B,EAAGwB,oBAAoB,UAAWtB,GAClCuB,EAAczB,GACVd,KAAavkB,GAAiC,mBAAnBA,EAAIukB,IAC/BvkB,EAAIukB,KAEZ,IAECkC,OAAO7hC,IAER,MAAO8hC,EAAWC,GAAiBC,EAAY,CAC3Cv8B,MAAO,IAAI08B,UAAU,+BACrB,CAACvC,GAAc,IAEnBa,EAAG5mB,YAAYpR,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGo5B,GAAY,CAAE75B,OAAO85B,EAAc,GAE1F,IACItB,EAAG58B,OACH48B,EAAG58B,OAEX,CAIA,SAASq+B,EAAcE,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAAS1iC,YAAYkJ,IAChC,EAEQy5B,CAAcD,IACdA,EAASE,OACjB,CACA,SAASlvB,EAAKqtB,EAAI8B,GACd,OAAOC,EAAY/B,EAAI,GAAI8B,EAC/B,CACA,SAASE,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIziC,MAAM,6CAExB,CACA,SAAS0iC,EAAgBlC,GACrB,OAAOmC,EAAuBnC,EAAI,CAC9B37B,KAAM,YACPg3B,MAAK,KACJoG,EAAczB,EAAG,GAEzB,CACA,MAAMoC,EAAe,IAAIC,QACnBC,EAAkB,yBAA0B9H,YAC9C,IAAIxd,sBAAsBgjB,IACtB,MAAMuC,GAAYH,EAAa1gC,IAAIs+B,IAAO,GAAK,EAC/CoC,EAAa34B,IAAIu2B,EAAIuC,GACJ,IAAbA,GACAL,EAAgBlC,EACpB,IAcR,SAAS+B,EAAY/B,EAAIS,EAAO,GAAIqB,EAAS,WAAc,GACvD,IAAIU,GAAkB,EACtB,MAAMvB,EAAQ,IAAIwB,MAAMX,EAAQ,CAC5B,GAAApgC,CAAIghC,EAAS3B,GAET,GADAiB,EAAqBQ,GACjBzB,IAAS9B,EACT,MAAO,MAXvB,SAAyBgC,GACjBqB,GACAA,EAAgBplB,WAAW+jB,EAEnC,CAQoB0B,CAAgB1B,GAChBiB,EAAgBlC,GAChBwC,GAAkB,CAAI,EAG9B,GAAa,SAATzB,EAAiB,CACjB,GAAoB,IAAhBN,EAAKx8B,OACL,MAAO,CAAEo3B,KAAM,IAAM4F,GAEzB,MAAM2B,EAAIT,EAAuBnC,EAAI,CACjC37B,KAAM,MACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,eACzB26B,KAAKsF,GACR,OAAOiC,EAAEvH,KAAKyH,KAAKF,EACvB,CACA,OAAOb,EAAY/B,EAAI,IAAIS,EAAMM,GACrC,EACA,GAAAt3B,CAAIi5B,EAAS3B,EAAMC,GACfgB,EAAqBQ,GAGrB,MAAOx9B,EAAOs8B,GAAiBC,EAAYP,GAC3C,OAAOmB,EAAuBnC,EAAI,CAC9B37B,KAAM,MACNo8B,KAAM,IAAIA,EAAMM,GAAM9/B,KAAK4hC,GAAMA,EAAEniC,aACnCsE,SACDs8B,GAAejG,KAAKsF,EAC3B,EACA,KAAA7gB,CAAM4iB,EAASK,EAAUC,GACrBhB,EAAqBQ,GACrB,MAAMS,EAAOxC,EAAKA,EAAKx8B,OAAS,GAChC,GAAIg/B,IAASjE,EACT,OAAOmD,EAAuBnC,EAAI,CAC9B37B,KAAM,aACPg3B,KAAKsF,GAGZ,GAAa,SAATsC,EACA,OAAOlB,EAAY/B,EAAIS,EAAKhmB,MAAM,GAAI,IAE1C,MAAOimB,EAAcY,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBnC,EAAI,CAC9B37B,KAAM,QACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,aACxBggC,gBACDY,GAAejG,KAAKsF,EAC3B,EACA,SAAAwC,CAAUT,EAASM,GACfhB,EAAqBQ,GACrB,MAAO9B,EAAcY,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBnC,EAAI,CAC9B37B,KAAM,YACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,aACxBggC,gBACDY,GAAejG,KAAKsF,EAC3B,IAGJ,OA7EJ,SAAuBM,EAAOjB,GAC1B,MAAMuC,GAAYH,EAAa1gC,IAAIs+B,IAAO,GAAK,EAC/CoC,EAAa34B,IAAIu2B,EAAIuC,GACjBD,GACAA,EAAgBrlB,SAASgkB,EAAOjB,EAAIiB,EAE5C,CAsEImC,CAAcnC,EAAOjB,GACdiB,CACX,CAIA,SAASiC,EAAiBxC,GACtB,MAAM2C,EAAY3C,EAAaz/B,IAAIsgC,GACnC,MAAO,CAAC8B,EAAUpiC,KAAKqiC,GAAMA,EAAE,MALnBC,EAK+BF,EAAUpiC,KAAKqiC,GAAMA,EAAE,KAJ3DngC,MAAMod,UAAUijB,OAAO1jB,MAAM,GAAIyjB,KAD5C,IAAgBA,CAMhB,CACA,MAAMpC,EAAgB,IAAIkB,QAe1B,SAASd,EAAYv8B,GACjB,IAAK,MAAOmD,EAAMs7B,KAAYpE,EAC1B,GAAIoE,EAAQnE,UAAUt6B,GAAQ,CAC1B,MAAO0+B,EAAiBpC,GAAiBmC,EAAQlE,UAAUv6B,GAC3D,MAAO,CACH,CACIX,KAAM,UACN8D,OACAnD,MAAO0+B,GAEXpC,EAER,CAEJ,MAAO,CACH,CACIj9B,KAAM,MACNW,SAEJm8B,EAAcz/B,IAAIsD,IAAU,GAEpC,CACA,SAAS27B,EAAc37B,GACnB,OAAQA,EAAMX,MACV,IAAK,UACD,OAAOg7B,EAAiB39B,IAAIsD,EAAMmD,MAAMy3B,YAAY56B,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAASm9B,EAAuBnC,EAAI2D,EAAKzC,GACrC,OAAO,IAAI3yB,SAASC,IAChB,MAAMhH,EAeH,IAAIrE,MAAM,GACZoW,KAAK,GACLtY,KAAI,IAAMyV,KAAKktB,MAAMltB,KAAKmtB,SAAWC,OAAOC,kBAAkBrjC,SAAS,MACvE6L,KAAK,KAjBNyzB,EAAGlnB,iBAAiB,WAAW,SAASjU,EAAEs7B,GACjCA,EAAGv3B,MAASu3B,EAAGv3B,KAAKpB,IAAM24B,EAAGv3B,KAAKpB,KAAOA,IAG9Cw4B,EAAGwB,oBAAoB,UAAW38B,GAClC2J,EAAQ2xB,EAAGv3B,MACf,IACIo3B,EAAG58B,OACH48B,EAAG58B,QAEP48B,EAAG5mB,YAAYpR,OAAOC,OAAO,CAAET,MAAMm8B,GAAMzC,EAAU,GAE7D","sources":["webpack://aleo-website/../src/account.ts","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/offline-key-provider.ts","webpack://aleo-website/../src/record-provider.ts","webpack://aleo-website/../src/managed-worker.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js","webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs"],"sourcesContent":["import {\n Address,\n PrivateKey,\n Signature,\n ViewKey,\n PrivateKeyCiphertext,\n RecordCiphertext,\n} from \"./index\";\n\ninterface AccountParam {\n privateKey?: string;\n seed?: Uint8Array;\n}\n\n/**\n * Key Management class. Enables the creation of a new Aleo Account, importation of an existing account from\n * an existing private key or seed, and message signing and verification functionality.\n *\n * An Aleo Account is generated from a randomly generated seed (number) from which an account private key, view key,\n * and a public account address are derived. The private key lies at the root of an Aleo account. It is a highly\n * sensitive secret and should be protected as it allows for creation of Aleo Program executions and arbitrary value\n * transfers. The View Key allows for decryption of a user's activity on the blockchain. The Address is the public\n * address to which other users of Aleo can send Aleo credits and other records to. This class should only be used\n * environments where the safety of the underlying key material can be assured.\n *\n * @example\n * // Create a new account\n * const myRandomAccount = new Account();\n *\n * // Create an account from a randomly generated seed\n * const seed = new Uint8Array([94, 91, 52, 251, 240, 230, 226, 35, 117, 253, 224, 210, 175, 13, 205, 120, 155, 214, 7, 169, 66, 62, 206, 50, 188, 40, 29, 122, 40, 250, 54, 18]);\n * const mySeededAccount = new Account({seed: seed});\n *\n * // Create an account from an existing private key\n * const myExistingAccount = new Account({privateKey: 'myExistingPrivateKey'})\n *\n * // Sign a message\n * const hello_world = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = myRandomAccount.sign(hello_world)\n *\n * // Verify a signature\n * myRandomAccount.verify(hello_world, signature)\n */\nexport class Account {\n _privateKey: PrivateKey;\n _viewKey: ViewKey;\n _address: Address;\n\n constructor(params: AccountParam = {}) {\n try {\n this._privateKey = this.privateKeyFromParams(params);\n } catch (e) {\n console.error(\"Wrong parameter\", e);\n throw new Error(\"Wrong Parameter\");\n }\n this._viewKey = ViewKey.from_private_key(this._privateKey);\n this._address = Address.from_private_key(this._privateKey);\n }\n\n /**\n * Attempts to create an account from a private key ciphertext\n * @param {PrivateKeyCiphertext | string} ciphertext\n * @param {string} password\n * @returns {PrivateKey | Error}\n *\n * @example\n * const ciphertext = PrivateKey.newEncrypted(\"password\");\n * const account = Account.fromCiphertext(ciphertext, \"password\");\n */\n public static fromCiphertext(ciphertext: PrivateKeyCiphertext | string, password: string) {\n try {\n ciphertext = (typeof ciphertext === \"string\") ? PrivateKeyCiphertext.fromString(ciphertext) : ciphertext;\n const _privateKey = PrivateKey.fromPrivateKeyCiphertext(ciphertext, password);\n return new Account({ privateKey: _privateKey.to_string() });\n } catch(e) {\n throw new Error(\"Wrong password or invalid ciphertext\");\n }\n }\n\n private privateKeyFromParams(params: AccountParam) {\n if (params.seed) {\n return PrivateKey.from_seed_unchecked(params.seed);\n }\n if (params.privateKey) {\n return PrivateKey.from_string(params.privateKey);\n }\n return new PrivateKey();\n }\n\n privateKey() {\n return this._privateKey;\n }\n\n viewKey() {\n return this._viewKey;\n }\n\n address() {\n return this._address;\n }\n\n toString() {\n return this.address().to_string()\n }\n\n /**\n * Encrypt the account's private key with a password\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n *\n * @example\n * const account = new Account();\n * const ciphertext = account.encryptAccount(\"password\");\n */\n encryptAccount(password: string) {\n return this._privateKey.toCiphertext(password);\n }\n\n /**\n * Decrypts a Record in ciphertext form into plaintext\n * @param {string} ciphertext\n * @returns {Record}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecord(\"record1ciphertext\");\n */\n decryptRecord(ciphertext: string) {\n return this._viewKey.decrypt(ciphertext);\n }\n\n /**\n * Decrypts an array of Records in ciphertext form into plaintext\n * @param {string[]} ciphertexts\n * @returns {Record[]}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecords([\"record1ciphertext\", \"record2ciphertext\"]);\n */\n decryptRecords(ciphertexts: string[]) {\n return ciphertexts.map((ciphertext) => this._viewKey.decrypt(ciphertext));\n }\n\n /**\n * Determines whether the account owns a ciphertext record\n * @param {RecordCipherText | string} ciphertext\n * @returns {boolean}\n *\n * @example\n * // Create a connection to the Aleo network and an account\n * const connection = new NodeConnection(\"vm.aleo.org/api\");\n * const account = Account.fromCiphertext(\"ciphertext\", \"password\");\n *\n * // Get a record from the network\n * const record = connection.getBlock(1234);\n * const recordCipherText = record.transactions[0].execution.transitions[0].id;\n *\n * // Check if the account owns the record\n * if account.ownsRecord(recordCipherText) {\n * // Then one can do something like:\n * // Decrypt the record and check if it's spent\n * // Store the record in a local database\n * // Etc.\n * }\n */\n ownsRecordCiphertext(ciphertext: RecordCiphertext | string) {\n if (typeof ciphertext === 'string') {\n try {\n const ciphertextObject = RecordCiphertext.fromString(ciphertext);\n return ciphertextObject.isOwner(this._viewKey);\n }\n catch (e) {\n return false;\n }\n }\n else {\n return ciphertext.isOwner(this._viewKey);\n }\n }\n\n /**\n * Signs a message with the account's private key.\n * Returns a Signature.\n *\n * @param {Uint8Array} message\n * @returns {Signature}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * account.sign(message);\n */\n sign(message: Uint8Array) {\n return this._privateKey.sign(message);\n }\n\n /**\n * Verifies the Signature on a message.\n *\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = account.sign(message);\n * account.verify(message, signature);\n */\n verify(message: Uint8Array, signature: Signature) {\n return this._address.verify(message, signature);\n }\n\n}\n","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n FunctionKeyProvider,\n KeySearchParams,\n FunctionKeyPair,\n CachedKeyPair,\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\n\n/**\n * Search parameters for the offline key provider. This class implements the KeySearchParams interface and includes\n * a convenience method for creating a new instance of this class for each function of the credits.aleo program.\n *\n * @example\n * // If storing a key for a custom program function\n * offlineSearchParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * // If storing a key for a credits.aleo program function\n * bondPublicKeyParams = OfflineSearchParams.bondPublicKeyParams();\n */\nclass OfflineSearchParams implements KeySearchParams {\n cacheKey: string | undefined;\n verifyCreditsKeys: boolean | undefined;\n\n /**\n * Create a new OfflineSearchParams instance.\n *\n * @param {string} cacheKey - Key used to store the local function proving & verifying keys. This should be stored\n * under the naming convention \"programName/functionName\" (i.e. \"myprogram.aleo/myfunction\")\n * @param {boolean} verifyCreditsKeys - Whether to verify the keys against the credits.aleo program,\n * defaults to false, but should be set to true if using keys from the credits.aleo program\n */\n constructor(cacheKey: string, verifyCreditsKeys = false) {\n this.cacheKey = cacheKey;\n this.verifyCreditsKeys = verifyCreditsKeys;\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_public function of the credits.aleo program.\n */\n static bondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_validator function of the credits.aleo program.\n */\n static bondValidatorKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_validator.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the claim_unbond_public function of the\n */\n static claimUnbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_private function of the credits.aleo program.\n */\n static feePrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_public function of the credits.aleo program.\n */\n static feePublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the inclusion prover function.\n */\n static inclusionKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.inclusion.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the join function of the credits.aleo program.\n */\n static joinKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.join.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the set_validator_state function of the credits.aleo program.\n */\n static setValidatorStateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.set_validator_state.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the split function of the credits.aleo program.\n */\n static splitKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.split.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private function of the credits.aleo program.\n */\n static transferPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private_to_public function of the credits.aleo program.\n */\n static transferPrivateToPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public function of the credits.aleo program.\n */\n static transferPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_as_signer function of the credits.aleo program.\n */\n static transferPublicAsSignerKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_as_signer.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_to_private function of the credits.aleo program.\n */\n static transferPublicToPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the unbond_public function of the credits.aleo program.\n */\n static unbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.unbond_public.locator, true);\n }\n}\n\n/**\n * A key provider meant for building transactions offline on devices such as hardware wallets. This key provider is not\n * able to contact the internet for key material and instead relies on the user to insert Aleo function proving &\n * verifying keys from local storage prior to usage.\n *\n * @example\n * // Create an offline program manager\n * const programManager = new ProgramManager();\n *\n * // Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * // Create the proving keys from the key bytes on the offline machine\n * console.log(\"Creating proving keys from local key files\");\n * const program = \"program hello_hello.aleo; function hello: input r0 as u32.public; input r1 as u32.private; add r0 r1 into r2; output r2 as u32.private;\";\n * const myFunctionProver = await getLocalKey(\"/path/to/my/function/hello_hello.prover\");\n * const myFunctionVerifier = await getLocalKey(\"/path/to/my/function/hello_hello.verifier\");\n * const feePublicProvingKeyBytes = await getLocalKey(\"/path/to/credits.aleo/feePublic.prover\");\n *\n * myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProver);\n * myFunctionVerifyingKey = VerifyingKey.fromBytes(myFunctionVerifier);\n * const feePublicProvingKey = ProvingKey.fromBytes(feePublicKeyBytes);\n *\n * // Create an offline key provider\n * console.log(\"Creating offline key provider\");\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys\n * // Cache the proving and verifying keys for the custom hello function\n * OfflineKeyProvider.cacheKeys(\"hello_hello.aleo/hello\", myFunctionProvingKey, myFunctionVerifyingKey);\n *\n * // Cache the proving key for the fee_public function (the verifying key is automatically cached)\n * OfflineKeyProvider.insertFeePublicKey(feePublicProvingKey);\n *\n * // Create an offline query using the latest state root in order to create the inclusion proof\n * const offlineQuery = new OfflineQuery(\"latestStateRoot\");\n *\n * // Insert the key provider into the program manager\n * programManager.setKeyProvider(offlineKeyProvider);\n *\n * // Create the offline search params\n * const offlineSearchParams = new OfflineSearchParams(\"hello_hello.aleo/hello\");\n *\n * // Create the offline transaction\n * const offlineExecuteTx = await this.buildExecutionTransaction(\"hello_hello.aleo\", \"hello\", 1, false, [\"5u32\", \"5u32\"], undefined, offlineSearchParams, undefined, undefined, undefined, undefined, offlineQuery, program);\n *\n * // Broadcast the transaction later on a machine with internet access\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const txId = await networkClient.broadcastTransaction(offlineExecuteTx);\n */\nclass OfflineKeyProvider implements FunctionKeyProvider {\n cache: Map;\n\n constructor() {\n this.cache = new Map();\n }\n\n /**\n * Get bond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondPublicKeyParams());\n };\n\n /**\n * Get bond_validator function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondValidatorKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondValidatorKeyParams());\n };\n\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.claimUnbondPublicKeyParams());\n };\n\n /**\n * Get arbitrary function key from the offline key provider cache.\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * /// First cache the keys from local offline resources\n * const offlineKeyProvider = new OfflineKeyProvider();\n * const myFunctionVerifyingKey = VerifyingKey.fromString(\"verifier...\");\n * const myFunctionProvingKeyBytes = await readBinaryFile('./resources/myfunction.prover');\n * const myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProvingKeyBytes);\n *\n * /// Cache the keys for future use with a memorable locator\n * offlineKeyProvider.cacheKeys(\"myprogram.aleo/myfunction\", [myFunctionProvingKey, myFunctionVerifyingKey]);\n *\n * /// When they're needed, retrieve the keys from the cache\n *\n * /// First create a search parameter object with the same locator used to cache the keys\n * const keyParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * /// Then retrieve the keys\n * const [myFunctionProver, myFunctionVerifier] = await offlineKeyProvider.functionKeys(keyParams);\n */\n functionKeys(params?: KeySearchParams): Promise {\n return new Promise((resolve, reject) => {\n if (params === undefined) {\n reject(new Error(\"No search parameters provided, cannot retrieve keys\"));\n } else {\n const keyId = params.cacheKey;\n const verifyCreditsKeys = params.verifyCreditsKeys;\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId) as CachedKeyPair;\n const provingKey = ProvingKey.fromBytes(provingKeyBytes);\n const verifyingKey = VerifyingKey.fromBytes(verifyingKeyBytes);\n if (verifyCreditsKeys) {\n const keysMatchExpected = this.verifyCreditsKeys(keyId, provingKey, verifyingKey)\n if (!keysMatchExpected) {\n reject (new Error(`Cached keys do not match expected keys for ${keyId}`));\n }\n }\n resolve([provingKey, verifyingKey]);\n } else {\n reject(new Error(\"Keys not found in cache for \" + keyId));\n }\n }\n });\n };\n\n /**\n * Determines if the keys for a given credits function match the expected keys.\n *\n * @returns {boolean} Whether the keys match the expected keys\n */\n verifyCreditsKeys(locator: string, provingKey: ProvingKey, verifyingKey: VerifyingKey): boolean {\n switch (locator) {\n case CREDITS_PROGRAM_KEYS.bond_public.locator:\n return provingKey.isBondPublicProver() && verifyingKey.isBondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.locator:\n return provingKey.isClaimUnbondPublicProver() && verifyingKey.isClaimUnbondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.fee_private.locator:\n return provingKey.isFeePrivateProver() && verifyingKey.isFeePrivateVerifier();\n case CREDITS_PROGRAM_KEYS.fee_public.locator:\n return provingKey.isFeePublicProver() && verifyingKey.isFeePublicVerifier();\n case CREDITS_PROGRAM_KEYS.inclusion.locator:\n return provingKey.isInclusionProver() && verifyingKey.isInclusionVerifier();\n case CREDITS_PROGRAM_KEYS.join.locator:\n return provingKey.isJoinProver() && verifyingKey.isJoinVerifier();\n case CREDITS_PROGRAM_KEYS.set_validator_state.locator:\n return provingKey.isSetValidatorStateProver() && verifyingKey.isSetValidatorStateVerifier();\n case CREDITS_PROGRAM_KEYS.split.locator:\n return provingKey.isSplitProver() && verifyingKey.isSplitVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private.locator:\n return provingKey.isTransferPrivateProver() && verifyingKey.isTransferPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator:\n return provingKey.isTransferPrivateToPublicProver() && verifyingKey.isTransferPrivateToPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public.locator:\n return provingKey.isTransferPublicProver() && verifyingKey.isTransferPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator:\n return provingKey.isTransferPublicToPrivateProver() && verifyingKey.isTransferPublicToPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.unbond_public.locator:\n return provingKey.isUnbondPublicProver() && verifyingKey.isUnbondPublicVerifier();\n default:\n return false;\n }\n }\n\n /**\n * Get fee_private function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePrivateKeyParams());\n };\n\n /**\n * Get fee_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePublicKeyParams());\n };\n\n /**\n * Get join function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.joinKeyParams());\n };\n\n /**\n * Get split function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.splitKeyParams());\n };\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program.\n *\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new OfflineKeyProvider\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys for future use with the official locator\n * const transferPublicProvingKeyBytes = await readBinaryFile('./resources/transfer_public.prover.a74565e');\n * const transferPublicProvingKey = ProvingKey.fromBytes(transferPublicProvingKeyBytes);\n *\n * // Cache the transfer_public keys for future use with the OfflinKeyProvider's convenience method for\n * // transfer_public (the verifying key will be cached automatically)\n * offlineKeyProvider.insertTransferPublicKeys(transferPublicProvingKey);\n *\n * /// When they're needed, retrieve the keys from the cache\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateKeyParams());\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateToPublicKeyParams());\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicKeyParams());\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicAsSignerKeyParams());\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicToPrivateKeyParams());\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async unBondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.unbondPublicKeyParams());\n };\n\n /**\n * Insert the proving and verifying keys for the bond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for bond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertBondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isBondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [provingKey.toBytes(), VerifyingKey.bondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for bond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the claim_unbond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for claim_unbond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertClaimUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isClaimUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, [provingKey.toBytes(), VerifyingKey.claimUnbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for claim_unbond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_private.locator, [provingKey.toBytes(), VerifyingKey.feePrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePublicKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_public.locator, [provingKey.toBytes(), VerifyingKey.feePublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the join function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for join before inserting them into the cache.\n *\n * @param provingKey\n */\n insertJoinKeys(provingKey: ProvingKey) {\n if (provingKey.isJoinProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.join.locator, [provingKey.toBytes(), VerifyingKey.joinVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for join\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the set_validator_state function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for set_validator_state before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSetValidatorStateKeys(provingKey: ProvingKey) {\n if (provingKey.isSetValidatorStateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.set_validator_state.locator, [provingKey.toBytes(), VerifyingKey.setValidatorStateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for set_validator_state\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the split function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for split before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSplitKeys(provingKey: ProvingKey) {\n if (provingKey.isSplitProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.split.locator, [provingKey.toBytes(), VerifyingKey.splitVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for split\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private_to_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private_to_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateToPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateToPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateToPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private_to_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public.locator, [provingKey.toBytes(), VerifyingKey.transferPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public_to_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public_to_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicToPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicToPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, [provingKey.toBytes(), VerifyingKey.transferPublicToPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public_to_private\");\n }\n }\n\n insertUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.unbond_public.locator, [provingKey.toBytes(), VerifyingKey.unbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for unbond_public\");\n }\n }\n}\n\n\nexport {OfflineKeyProvider, OfflineSearchParams}\n","import { logAndThrow, RecordPlaintext } from \"./index\";\nimport { Account } from \"./account\";\nimport { AleoNetworkClient } from \"./network-client\";\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface RecordSearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * Interface for a record provider. A record provider is used to find records for use in deployment and execution\n * transactions on the Aleo Network. A default implementation is provided by the NetworkRecordProvider class. However,\n * a custom implementation can be provided (say if records are synced locally to a database from the network) by\n * implementing this interface.\n */\ninterface RecordProvider {\n account: Account\n\n /**\n * Find a credits.aleo record with a given number of microcredits from the chosen provider\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, its nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const record2 = await recordProvider.findCreditsRecord(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find a list of credit.aleo records with a given number of microcredits from the chosen provider\n *\n * @param {number} microcreditAmounts A list of separate microcredit amounts to search for (e.g. [5000, 100000])\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} A list of records with a value greater or equal to the amounts specified if such records exist, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const records = await recordProvider.findCreditsRecords([5000, 5000], true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const nonces = [];\n * records.forEach(record => { nonces.push(record.nonce()) });\n * const records2 = await recordProvider.findCreditsRecord(5000, true, nonces);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecords(microcreditAmounts: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find an arbitrary record\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * program: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.program = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, \"credits.aleo\", \"credits\");\n *\n * const record = await recordProvider.findRecord(true, [], params);\n */\n findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find multiple records from arbitrary programs\n *\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * maxRecords: number;\n * programName: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.maxRecords = maxRecords;\n * this.programName = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, 2, \"credits.aleo\", \"credits\");\n * const records = await recordProvider.findRecord(true, [], params);\n */\n findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n}\n\n/**\n * A record provider implementation that uses the official Aleo API to find records for usage in program execution and\n * deployment, wallet functionality, and other use cases.\n */\nclass NetworkRecordProvider implements RecordProvider {\n account: Account;\n networkClient: AleoNetworkClient;\n constructor(account: Account, networkClient: AleoNetworkClient) {\n this.account = account;\n this.networkClient = networkClient;\n }\n\n /**\n * Set the account used to search for records\n *\n * @param {Account} account The account to use for searching for records\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Find a list of credit records with a given number of microcredits by via the official Aleo API\n *\n * @param {number[]} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * */\n async findCreditsRecords(microcredits: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n let startHeight = 0;\n let endHeight = 0;\n\n if (searchParameters) {\n if (\"startHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n startHeight = searchParameters[\"startHeight\"];\n }\n\n if (\"endHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n endHeight = searchParameters[\"endHeight\"];\n }\n }\n\n // If the end height is not specified, use the current block height\n if (endHeight == 0) {\n const end = await this.networkClient.getLatestHeight();\n if (end instanceof Error) {\n throw logAndThrow(\"Unable to get current block height from the network\")\n }\n endHeight = end;\n }\n\n // If the start height is greater than the end height, throw an error\n if (startHeight >= endHeight) {\n throw logAndThrow(\"Start height must be less than end height\");\n }\n\n return await this.networkClient.findUnspentRecords(startHeight, endHeight, this.account.privateKey(), microcredits, undefined, nonces);\n }\n\n /**\n * Find a credit record with a given number of microcredits by via the official Aleo API\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n async findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n const records = await this.findCreditsRecords([microcredits], unspent, nonces, searchParameters);\n if (!(records instanceof Error) && records.length > 0) {\n return records[0];\n }\n console.error(\"Record not found with error:\", records);\n return new Error(\"Record not found\");\n }\n\n /**\n * Find an arbitrary record. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n /**\n * Find multiple arbitrary records. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n}\n\n/**\n * BlockHeightSearch is a RecordSearchParams implementation that allows for searching for records within a given\n * block height range.\n *\n * @example\n * // Create a new BlockHeightSearch\n * const params = new BlockHeightSearch(89995, 99995);\n *\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits and the block height search\n * // can be used to find records within a given block height range\n * const record = await recordProvider.findCreditsRecord(5000, true, [], params);\n *\n */\nclass BlockHeightSearch implements RecordSearchParams {\n startHeight: number;\n endHeight: number;\n constructor(startHeight: number, endHeight: number) {\n this.startHeight = startHeight;\n this.endHeight = endHeight;\n }\n}\n\nexport { BlockHeightSearch, NetworkRecordProvider, RecordProvider, RecordSearchParams};\n","// Experimental example where SDK manages worker\n\nimport { wrap } from \"comlink\";\nimport { WorkerAPI } from './worker';\n\nlet singletonWorker: WorkerAPI | null = null;\n\nconst createAleoWorker = (): WorkerAPI => {\n if (!singletonWorker) {\n const worker = new Worker(new URL(\"worker.js\", import.meta.url), {\n type: \"module\",\n });\n singletonWorker = wrap(worker);\n }\n return singletonWorker;\n};\n\nexport { createAleoWorker };","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n","/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n"],"names":["Account","_privateKey","_viewKey","_address","constructor","params","this","privateKeyFromParams","e","console","error","Error","ViewKey","from_private_key","Address","fromCiphertext","ciphertext","password","PrivateKeyCiphertext","fromString","PrivateKey","fromPrivateKeyCiphertext","privateKey","to_string","seed","from_seed_unchecked","from_string","viewKey","address","toString","encryptAccount","toCiphertext","decryptRecord","decrypt","decryptRecords","ciphertexts","map","ownsRecordCiphertext","isOwner","RecordCiphertext","sign","message","verify","signature","async","get","url","options","response","fetch","ok","status","post","method","AleoNetworkClient","host","headers","account","setAccount","getAccount","setHost","fetchData","json","findUnspentRecords","startHeight","endHeight","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","value","recordPlaintext","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","warn","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","inner","unBondPublicKeys","OfflineSearchParams","verifyCreditsKeys","bondPublicKeyParams","bondValidatorKeyParams","claimUnbondPublicKeyParams","feePrivateKeyParams","feePublicKeyParams","inclusionKeyParams","joinKeyParams","setValidatorStateKeyParams","splitKeyParams","transferPrivateKeyParams","transferPrivateToPublicKeyParams","transferPublicKeyParams","transferPublicAsSignerKeyParams","transferPublicToPrivateKeyParams","unbondPublicKeyParams","OfflineKeyProvider","Promise","resolve","reject","undefined","isBondPublicProver","isBondPublicVerifier","isClaimUnbondPublicProver","isClaimUnbondPublicVerifier","isFeePrivateProver","isFeePrivateVerifier","isFeePublicProver","isFeePublicVerifier","isInclusionProver","isInclusionVerifier","isJoinProver","isJoinVerifier","isSetValidatorStateProver","isSetValidatorStateVerifier","isSplitProver","isSplitVerifier","isTransferPrivateProver","isTransferPrivateVerifier","isTransferPrivateToPublicProver","isTransferPrivateToPublicVerifier","isTransferPublicProver","isTransferPublicVerifier","isTransferPublicToPrivateProver","isTransferPublicToPrivateVerifier","isUnbondPublicProver","isUnbondPublicVerifier","insertBondPublicKeys","bondPublicVerifier","insertClaimUnbondPublicKeys","claimUnbondPublicVerifier","insertFeePrivateKeys","feePrivateVerifier","insertFeePublicKeys","feePublicVerifier","insertJoinKeys","joinVerifier","insertSetValidatorStateKeys","setValidatorStateVerifier","insertSplitKeys","splitVerifier","insertTransferPrivateKeys","transferPrivateVerifier","insertTransferPrivateToPublicKeys","transferPrivateToPublicVerifier","insertTransferPublicKeys","transferPublicVerifier","insertTransferPublicToPrivateKeys","transferPublicToPrivateVerifier","insertUnbondPublicKeys","unbondPublicVerifier","NetworkRecordProvider","networkClient","findCreditsRecords","unspent","searchParameters","findCreditsRecord","findRecord","findRecords","BlockHeightSearch","singletonWorker","createAleoWorker","worker","Worker","URL","wrap","ProgramManager","keyProvider","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initializeWasm","spawnWorker","module","memory","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","fill","getObject","idx","heap_next","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","cachedUint8Memory0","getUint8Memory0","buffer","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","isArray","builtInMatches","exec","call","className","JSON","stringify","_","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca","AddressFinalization","__wbg_address_free","__wrap","create","prototype","__destroy_into_raw","free","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","address_from_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","executionresponse_getExecution","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","executionresponse_getVerifyingKey","executionresponse_getFunctionId","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","ptr1","keypair_new","keypair_provingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","__wbg_get_metadata_name","__wbg_set_metadata_name","__wbg_get_metadata_locator","__wbg_set_metadata_locator","__wbg_get_metadata_prover","__wbg_set_metadata_prover","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","metadata_baseUrl","metadata_bond_public","metadata_bond_validator","metadata_claim_unbond_public","metadata_fee_private","metadata_fee_public","metadata_inclusion","metadata_join","metadata_set_validator_state","metadata_split","metadata_transfer_private","metadata_transfer_private_to_public","metadata_transfer_public","metadata_transfer_public_as_signer","metadata_transfer_public_to_private","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","privatekey_new","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","privatekey_toCiphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","program_fromString","program_toString","hasFunction","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","program_getCreditsProgram","program_id","program_address","isEqual","other","program_isEqual","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","fee_credits","fee_record","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","asUintN","_function","prove_execution","len4","programmanager_executeFunctionOffline","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","amount_credits","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","provingkey_isClaimUnbondPublicProver","provingkey_isFeePrivateProver","provingkey_isFeePublicProver","provingkey_isInclusionProver","provingkey_isJoinProver","provingkey_isSetValidatorStateProver","provingkey_isSplitProver","provingkey_isTransferPrivateProver","provingkey_isTransferPrivateToPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","provingkey_isTransferPublicToPrivateProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","bytes","provingkey_fromBytes","string","provingkey_fromString","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","recordciphertext_fromString","recordciphertext_toString","recordciphertext_decrypt","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","recordplaintext_microcredits","recordplaintext_nonce","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","verifyingkey_claimUnbondPublicVerifier","verifyingkey_feePrivateVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","verifyingkey_joinVerifier","verifyingkey_setValidatorStateVerifier","verifyingkey_splitVerifier","verifyingkey_transferPrivateVerifier","verifyingkey_transferPrivateToPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","verifyingkey_transferPublicToPrivateVerifier","verifyingkey_unbondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","verifyingkey_isClaimUnbondPublicVerifier","verifyingkey_isFeePrivateVerifier","verifyingkey_isFeePublicVerifier","verifyingkey_isInclusionVerifier","verifyingkey_isJoinVerifier","verifyingkey_isSetValidatorStateVerifier","verifyingkey_isSplitVerifier","verifyingkey_isTransferPrivateVerifier","verifyingkey_isTransferPrivateToPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicToPrivateVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","__wbg_load","Response","WebAssembly","instantiateStreaming","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","__wbg_status_d485fb5a478426fb","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_call_b3ca7c6051f9bec1","__wbg_log_0159ca40cddf5b15","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbg_transaction_new","Transaction$1","__wbindgen_bigint_from_u64","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","__wbg_fetch_bc7c8e27076a5c84","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","freeze","__proto__","Metadata$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info","proxyMarker","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","transferHandlers","canHandle","serialize","port1","port2","MessageChannel","expose","deserialize","port","serialized","isError","ep","allowedOrigins","callback","ev","origin","allowedOrigin","RegExp","test","isAllowedOrigin","path","argumentList","fromWireValue","returnValue","parent","reduce","prop","rawValue","proxy","transfers","transferCache","catch","wireValue","transferables","toWireValue","removeEventListener","closeEndPoint","TypeError","endpoint","isMessagePort","close","target","createProxy","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","newCount","isProxyReleased","Proxy","_target","unregisterProxy","r","p","bind","_thisArg","rawArgumentList","last","processArguments","construct","registerProxy","processed","v","arr","concat","handler","serializedValue","msg","floor","random","Number","MAX_SAFE_INTEGER"],"sourceRoot":""} \ No newline at end of file +{"version":3,"file":"52.bundle.js","mappings":";0tCA2CaA,EACXC,YACAC,SACAC,SAEAC,WAAAA,CAAYC,EAAuB,CAAC,GAClC,IACEC,KAAKL,YAAcK,KAAKC,qBAAqBF,GAC7C,MAAOG,GAEP,MADAC,QAAQC,MAAM,kBAAmBF,GAC3B,IAAIG,MAAM,mBAElBL,KAAKJ,SAAWU,EAAAA,GAAQC,iBAAiBP,KAAKL,aAC9CK,KAAKH,SAAWW,EAAAA,GAAQD,iBAAiBP,KAAKL,aAazC,qBAAOc,CAAeC,EAA2CC,GACtE,IACED,EAAoC,iBAAfA,EAA2BE,EAAAA,GAAqBC,WAAWH,GAAcA,EAC9F,MAAMf,EAAcmB,EAAAA,GAAWC,yBAAyBL,EAAYC,GACpE,OAAO,IAAIjB,EAAQ,CAAEsB,WAAYrB,EAAYsB,cAC7C,MAAMf,GACN,MAAM,IAAIG,MAAM,yCAIZJ,oBAAAA,CAAqBF,GAC3B,OAAIA,EAAOmB,KACFJ,EAAAA,GAAWK,oBAAoBpB,EAAOmB,MAE3CnB,EAAOiB,WACFF,EAAAA,GAAWM,YAAYrB,EAAOiB,YAEhC,IAAIF,EAAAA,GAGbE,UAAAA,GACE,OAAOhB,KAAKL,YAGd0B,OAAAA,GACE,OAAOrB,KAAKJ,SAGd0B,OAAAA,GACE,OAAOtB,KAAKH,SAGd0B,QAAAA,GACE,OAAOvB,KAAKsB,UAAUL,YAYxBO,cAAAA,CAAeb,GACb,OAAOX,KAAKL,YAAY8B,aAAad,GAYvCe,aAAAA,CAAchB,GACZ,OAAOV,KAAKJ,SAAS+B,QAAQjB,GAY/BkB,cAAAA,CAAeC,GACb,OAAOA,EAAYC,KAAKpB,GAAeV,KAAKJ,SAAS+B,QAAQjB,KAyB/DqB,oBAAAA,CAAqBrB,GACnB,GAA0B,iBAAfA,EAUT,OAAOA,EAAWsB,QAAQhC,KAAKJ,UAT/B,IAEE,OADyBqC,EAAAA,GAAiBpB,WAAWH,GAC7BsB,QAAQhC,KAAKJ,UAEvC,MAAOM,GACL,OAAO,GAoBbgC,IAAAA,CAAKC,GACH,OAAOnC,KAAKL,YAAYuC,KAAKC,GAgB/BC,MAAAA,CAAOD,EAAqBE,GAC1B,OAAOrC,KAAKH,SAASuC,OAAOD,EAASE,ICnNlCC,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIvC,MAAMqC,EAASG,OAAS,sBAAwBL,GAG9D,OAAOE,CACX,CAGOJ,eAAeQ,EAAKN,EAAmBC,GAC1CA,EAAQM,OAAS,OAEjB,MAAML,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIvC,MAAMqC,EAASG,OAAS,uBAAyBL,GAG/D,OAAOE,CACX,CCUA,MAAMM,EACJC,KACAC,QACAC,QAEArD,WAAAA,CAAYmD,EAAcR,GACxBzC,KAAKiD,KAAOA,EAAO,WAEfR,GAAWA,EAAQS,QACrBlD,KAAKkD,QAAUT,EAAQS,QAGvBlD,KAAKkD,QAAU,CAEb,qBAAsB,UAa5BE,UAAAA,CAAWD,GACTnD,KAAKmD,QAAUA,EASjBE,UAAAA,GACE,OAAOrD,KAAKmD,QASdG,OAAAA,CAAQL,GACNjD,KAAKiD,KAAOA,EAAO,WAGrB,eAAMM,CACFf,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIvC,KAAKiD,KAAOT,EAAK,CAC1CU,QAASlD,KAAKkD,UAGhB,aAAaR,EAASc,OACpB,MAAOpD,GACP,MAAM,IAAIC,MAAM,yBA2BpB,wBAAMoD,CACFC,EACAC,EACA3C,EACA4C,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfJ,EAAc,EAChB,MAAM,IAAIrD,MAAM,mDAIlB,MAAM0D,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfvD,EAA4B,CACrC,QAA4B,IAAjBhB,KAAKmD,QACd,MAAM,IAAI9C,MAAM,oGAEhB8D,EAAqBnE,KAAKmD,QAAQxD,iBAGpC,IACEwE,EAAqBnD,aAAsBF,EAAAA,GAAaE,EAAaF,EAAAA,GAAWM,YAAYJ,GAC5F,MAAOZ,GACP,MAAM,IAAIC,MAAM,uCAGpB,MAAMgB,EAAU8C,EAAmBK,cAGnC,IACE,MAAMC,QAAoBzE,KAAK0E,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIpE,MAAM,uCAFhB+D,EAAeK,EAIjB,MAAOrE,GACP,MAAM,IAAIC,MAAM,uCAWlB,GANE6D,EADuB,iBAAdP,GAA0BA,GAAaS,EAC1CT,EAEAS,EAIJV,EAAcQ,EAChB,MAAM,IAAI7D,MAAM,0DAIlB,KAAO6D,EAAMR,GAAa,CACxBO,EAAQC,EAAM,GACVD,EAAQP,IACVO,EAAQP,GAEV,IAEE,MAAMiB,QAAe3E,KAAK4E,cAAcX,EAAOC,GAE/C,GADAA,EAAMD,IACAU,aAAkBtE,OAEtB,IAAK,IAAIwE,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAAS3D,EAAAA,GAAiBpB,WAAW8E,EAAOE,OAElD,GAAID,EAAO5D,QAAQX,GAAU,CAE3B,MAAMyE,EAAkBF,EAAOjE,QAAQN,GAGjC0E,EAAQD,EAAgBC,QAC9B,GAAIjC,EAAOkC,SAASD,GAClB,SAIF,MAAME,EAAeH,EAAgBI,mBAAmB/B,EAAoB,eAAgB,WAE5F,UACQnE,KAAKmG,gBAAgBF,GAC3B,MAAO7F,GAEP,IAAKwD,IACHG,EAAQqC,KAAKN,GAEkB,iBAApBjC,IACTS,GAAoBwB,EAAgBO,eAEhC/B,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQkB,OAAS,EAAG,CAC3D,IAAIwB,EAAgB,EACpB,GAAIR,EAAgBO,eAAiBzC,EAAQ0C,GAAgB,CAIzD,GAHAA,GAAiB,EACjBvC,EAAQqC,KAAKN,GAEkB,iBAApBjC,IACTS,GAAoBwB,EAAgBO,eAEhC/B,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQe,QAAUlB,EAAQkB,OAC5B,OAAOf,MAMnB,MAAO3D,GAAQ,OAYrC,MAAOA,GAKP,GAHAD,QAAQoG,KAAK,mCAAqCtC,EAAM1C,WAAa,IAAM2C,EAAI3C,YAC/EpB,QAAQoG,KAAK,UAAWnG,GACxBiE,GAAY,EACRA,EAAW,GAEb,OADAlE,QAAQoG,KAAK,0EACNxC,GAIb,OAAOA,EAUT,cAAMyC,CAASC,GACb,IAEE,aADoBzG,KAAKuD,UAAiB,UAAYkD,GAEtD,MAAOrG,GACP,MAAM,IAAIC,MAAM,0BAYpB,mBAAMuE,CAAcX,EAAeC,GACjC,IACE,aAAalE,KAAKuD,UAAwB,iBAAmBU,EAAQ,QAAUC,GAC/E,MAAO9D,GAEP,MAAM,IAAIC,MADW,iCAAmC4D,EAAQ,QAAUC,EAAM,MAWpF,0CAAMwC,CAAqClB,GACrCA,aAAmBmB,EAAAA,KACrBnB,EAAUA,EAAQjE,YAEpB,IAEE,aADiBvB,KAAKuD,UAAkB,kCAAoCiC,IAClEoB,QAAQ,IAAM,IACxB,MAAOxG,GACP,MAAM,IAAIC,MAAM,uDAUpB,wCAAMwG,CAAmCrB,GACvC,IACE,MAAMsB,QAA+B9G,KAAK0G,qCAAqClB,GAC/E,aAA+BxF,KAAK+G,eAAeD,GACnD,MAAO1G,GACP,MAAM,IAAIC,MAAM,uDAUpB,oBAAM2G,GACJ,IACE,aAAahH,KAAKuD,UAAiB,iBACnC,MAAOnD,GACP,MAAM,IAAIC,MAAM,iCASpB,wBAAM4G,GACJ,IACE,aAAajH,KAAKuD,UAAkB,qBACpC,MAAOnD,GACP,MAAM,IAAIC,MAAM,iCAUpB,qBAAMqE,GACJ,IACE,aAAa1E,KAAKuD,UAAkB,kBACpC,MAAOnD,GACP,MAAM,IAAIC,MAAM,kCAepB,gBAAM6G,CAAWC,GACf,IACE,aAAanH,KAAKuD,UAAkB,YAAc4D,GAClD,MAAO/G,GACP,MAAM,IAAIC,MAAM,2BAqBpB,sBAAM+G,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQ9F,WAAWwG,GAC1B,MAAOjH,GACP,IACE,OAAOuG,EAAAA,GAAQ9F,iBAA0Bb,KAAKkH,WAAWG,IACzD,MAAOjH,GACP,MAAM,IAAIC,MAAM,GAAGgH,oDA8BzB,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+BrH,KAAKoH,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAI5C,EAAI,EAAGA,EAAI2C,EAAW1C,OAAQD,IAAK,CAC1C,MAAM6C,EAAYF,EAAW3C,GAC7B,IAAK0C,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8B5H,KAAKkH,WAAWQ,GAC9CG,QAAsC7H,KAAKsH,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,GAGzB,OAAOL,EACP,MAAOnH,GACP,MAAM2H,EAAY,mCAAqC3H,IAe3D,2BAAM4H,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+BrH,KAAKoH,iBAAiBC,IACxFI,aACf,MAAOrH,GACP,MAAM,IAAIC,MAAM,8CAAgDD,IAapE,4BAAM6H,CAAuBd,GAC3B,IACE,aAAanH,KAAKuD,UAAyB,YAAc4D,EAAY,aACrE,MAAO/G,GACP,MAAM,IAAIC,MAAM,6FAkBpB,4BAAM6H,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAa9H,KAAKuD,UAAkB,YAAc4D,EAAY,YAAcgB,EAAc,IAAML,GAChG,MAAO1H,GACP,MAAM,IAAIC,MAAM,oFAUpB,kBAAM+H,GACJ,IACE,aAAapI,KAAKuD,UAAkB,qBACpC,MAAOnD,GACP,MAAM,IAAIC,MAAM,mCAWpB,oBAAM0G,CAAesB,GACnB,IACA,aAAarI,KAAKuD,UAA4B,gBAAkB8E,GAC9D,MAAOjI,GACP,MAAM,IAAIC,MAAM,gCAWpB,qBAAMiI,CAAgB7B,GACpB,IACA,aAAazG,KAAKuD,UAAmC,UAAYkD,EAAOlF,WAAa,iBACnF,MAAOnB,GACP,MAAM,IAAIC,MAAM,iCAUpB,8BAAMkI,GACJ,IACE,aAAavI,KAAKuD,UAAmC,4BACrD,MAAOnD,GACP,MAAM,IAAIC,MAAM,8CAWpB,qBAAM8F,CAAgBqC,GACpB,IACE,aAAaxI,KAAKuD,UAAkB,sBAAwBiF,GAC5D,MAAOpI,GACP,MAAM,IAAIC,MAAM,kCAUpB,uBAAMoI,CAAkBtD,GACtB,MAAMuD,EAAqBvD,aAAuBwD,EAAAA,GAAcxD,EAAY5D,WAAa4D,EACzF,IACE,MAAMzC,QAAiBI,EAAK9C,KAAKiD,KAAO,yBAA0B,CAChE2F,KAAMF,EACNxF,QAAS2F,OAAOC,OAAO,CAAC,EAAG9I,KAAKkD,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaR,EAASc,OAEtB,MAAOpD,GACP,MAAM,IAAIC,MAAM,qDAAsDD,EAAgB+B,YAExF,MAAO/B,GACP,MAAM,IAAIC,MAAM,oDAAqDD,EAAgB+B,aChnB3F,MAAM4G,EACFC,KACAC,UACAC,YACAC,SAUArJ,WAAAA,CAAYC,GACRC,KAAKiJ,UAAYlJ,EAAOkJ,UACxBjJ,KAAKkJ,YAAcnJ,EAAOmJ,YAC1BlJ,KAAKmJ,SAAWpJ,EAAOoJ,SACvBnJ,KAAKgJ,KAAOjJ,EAAOiJ,MAyK3B,MAAMI,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFhH,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBiH,QAAa/G,EAASgH,cAC5B,OAAO,IAAIC,WAAWF,GACpB,MAAOrJ,GACL,MAAM,IAAIC,MAAM,uBAAyBD,IAIjDN,WAAAA,GACIE,KAAKuJ,QAAUK,EACf5J,KAAKqJ,MAAQ,IAAIQ,IACjB7J,KAAKsJ,aAAc,EAQvBQ,QAAAA,CAASA,GACL9J,KAAKsJ,YAAcQ,EAMvBC,UAAAA,GACI/J,KAAKqJ,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnCnK,KAAKqJ,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAOlK,KAAKqJ,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAOlK,KAAKqJ,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/J,QAAQ0K,MAAM,2CAA2CX,KACrDlK,KAAKqJ,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC/K,KAAKqJ,MAAM9G,IAAI2H,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,IAEtE,OAAO,IAAI1K,MAAM,2BAwBzB,kBAAM8K,CAAapL,GACf,GAAIA,EAAQ,CACR,IAAIqL,EACAC,EACAlC,EACJ,GAAI,SAAUpJ,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAI+H,EAAMwD,EAAqBC,OAAOxL,EAAa,MACnD,KAAM+H,aAAezH,OACjB,OAAOL,KAAKwL,iBAAiB1D,GAgBrC,GAZI,cAAe/H,GAAwC,iBAAvBA,EAAkB,YAClDqL,EAAYrL,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDsL,EAActL,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDoJ,EAAWpJ,EAAiB,UAG5BqL,GAAaC,EACb,aAAarL,KAAKyL,gBAAgBL,EAAWC,EAAalC,GAG9D,GAAIA,EACA,OAAOnJ,KAAK4K,QAAQzB,GAG5B,MAAM9I,MAAM,oGA4BhB,qBAAMoL,CAAgBL,EAAmBC,EAAqBlC,GAC1D,IAEI,GAAInJ,KAAKsJ,YAAa,CACbH,IACDA,EAAWiC,GAEf,MAAMvF,EAAQ7F,KAAKqJ,MAAM9G,IAAI4G,GAC7B,QAAqB,IAAVtD,EACP,MAAO,CAACmF,EAAAA,GAAWC,UAAUpF,EAAM,IAAKqF,EAAAA,GAAaD,UAAUpF,EAAM,KAClE,CACH1F,QAAQ0K,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAC1EjL,QAAQ0K,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoCrK,KAAK0L,gBAAgBL,GAE/D,OADArL,KAAKqJ,MAAMiB,IAAInB,EAAU,CAACiB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,IAGvB,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAE1E,MAAO,CAAChB,QADkCpK,KAAK0L,gBAAgBL,KAGrE,MAAOjL,GACL,MAAM,IAAIC,MAAgB,UAAAD,kDAAsDgL,SAAiBC,OAYzG,qBAAMM,CAAgBP,EAAmBjC,GACrC,IAEI,GAAInJ,KAAKsJ,YAAa,CACbH,IACDA,EAAWiC,GAEf,MAAMvF,EAAQ7F,KAAKqJ,MAAM9G,IAAI4G,GAC7B,QAAqB,IAAVtD,EACP,OAAOmF,EAAAA,GAAWC,UAAUpF,EAAM,IAElC1F,QAAQ0K,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAM9E,OAD+BJ,EAAAA,GAAWC,gBAAgBjL,KAAKwJ,WAAW4B,IAGhF,MAAOhL,GACL,MAAM,IAAIC,MAAM,UAAUD,oCAAwCgL,MAI1E,sBAAMI,CAAiB1D,GACnB,IACI,GAAK9H,KAAKqJ,MAAMoB,IAAI3C,EAAI8D,UAAa5L,KAAKsJ,YAOnC,CACH,MAAMuC,EAAyB7L,KAAKqJ,MAAM9G,IAAIuF,EAAI8D,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,KATtB,CACnD,MAAMC,EAAgBhE,EAAIuC,eACpB0B,QAAgC/L,KAAK2L,gBAAgB7D,EAAIkE,OAAQlE,EAAI8D,SAI3E,OAHI5L,KAAKsJ,aACLtJ,KAAKqJ,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,IAK3B,MAAO1L,GACL,MAAM,IAAIC,MAAM,sCAAsCD,MAI9D,oBAAM8L,GACF,OAAOlM,KAAKwL,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAOnM,KAAKwL,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOrM,KAAKwL,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAaxM,KAAKwL,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAaxM,KAAKwL,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAaxM,KAAKwL,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAaxM,KAAKwL,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAaxM,KAAKwL,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAI7M,MAAM,2BASxB,cAAM8M,GACF,aAAanN,KAAKwL,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAarN,KAAKwL,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAavN,KAAKwL,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAazN,KAAKwL,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBxC,GAClB,OAAQA,GACJ,KAAKoC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM3H,QAAiBH,EAAI2G,GACrB6E,QAAarL,EAASqL,OAC5B,OAAqB7C,EAAAA,GAAarK,WAAWkN,GAC/C,MAAO7N,GAEL,IACA,OAAqBgL,EAAAA,GAAaD,gBAAgBjL,KAAKwJ,WAAWN,IAChE,MAAO8E,GACL,OAAO,IAAI3N,MAAM,iCAAmC2N,MAMxEC,gBAAAA,GACI,OAAOjO,KAAKwL,iBAAiBF,EAAqBwC,gBCrkB1D,MAAMI,EACF/E,SACAgF,kBAUArO,WAAAA,CAAYqJ,EAAkBgF,GAAoB,GAC9CnO,KAAKmJ,SAAWA,EAChBnJ,KAAKmO,kBAAoBA,EAM7B,0BAAOC,GACH,OAAO,IAAIF,EAAoB5C,EAAqBW,YAAYL,SAAS,GAM7E,6BAAOyC,GACH,OAAO,IAAIH,EAAoB5C,EAAqBc,eAAeR,SAAS,GAMhF,iCAAO0C,GACH,OAAO,IAAIJ,EAAoB5C,EAAqBgB,oBAAoBV,SAAS,GAMrF,0BAAO2C,GACH,OAAO,IAAIL,EAAoB5C,EAAqBkC,YAAY5B,SAAS,GAM7E,yBAAO4C,GACH,OAAO,IAAIN,EAAoB5C,EAAqBoC,WAAW9B,SAAS,GAM5E,yBAAO6C,GACH,OAAO,IAAIP,EAAoB5C,EAAqBsC,UAAUhC,SAAS,GAM3E,oBAAO8C,GACH,OAAO,IAAIR,EAAoB5C,EAAqB8B,KAAKxB,SAAS,GAMtE,iCAAO+C,GACH,OAAO,IAAIT,EAAoB5C,EAAqBuC,oBAAoBjC,SAAS,GAMrF,qBAAOgD,GACH,OAAO,IAAIV,EAAoB5C,EAAqBgC,MAAM1B,SAAS,GAMvE,+BAAOiD,GACH,OAAO,IAAIX,EAAoB5C,EAAqBoB,iBAAiBd,SAAS,GAMlF,uCAAOkD,GACH,OAAO,IAAIZ,EAAoB5C,EAAqBsB,2BAA2BhB,SAAS,GAM5F,8BAAOmD,GACH,OAAO,IAAIb,EAAoB5C,EAAqBwB,gBAAgBlB,SAAS,GAMjF,sCAAOoD,GACH,OAAO,IAAId,EAAoB5C,EAAqB0B,0BAA0BpB,SAAS,GAM3F,uCAAOqD,GACH,OAAO,IAAIf,EAAoB5C,EAAqB4B,2BAA2BtB,SAAS,GAM5F,4BAAOsD,GACH,OAAO,IAAIhB,EAAoB5C,EAAqBwC,cAAclC,SAAS,IAuDnF,MAAMuD,EACF9F,MAEAvJ,WAAAA,GACIE,KAAKqJ,MAAQ,IAAIQ,IASrBqC,cAAAA,GACI,OAAOlM,KAAKmL,aAAa+C,EAAoBE,uBASjDjC,iBAAAA,GACI,OAAOnM,KAAKmL,aAAa+C,EAAoBG,0BAWjDpE,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnCnK,KAAKqJ,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9D8B,qBAAAA,GACI,OAAOrM,KAAKmL,aAAa+C,EAAoBI,8BA2BjDnD,YAAAA,CAAapL,GACT,OAAO,IAAIqP,SAAQ,CAACC,EAASC,KACzB,QAAeC,IAAXxP,EACAuP,EAAO,IAAIjP,MAAM,4DACd,CACH,MAAM6J,EAAQnK,EAAOoJ,SACfgF,EAAoBpO,EAAOoO,kBACjC,GAAInO,KAAKqJ,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAqB/K,KAAKqJ,MAAM9G,IAAI2H,GACtDE,EAAaY,EAAAA,GAAWC,UAAUH,GAClCT,EAAea,EAAAA,GAAaD,UAAUF,GAC5C,GAAIoD,EAAmB,CACOnO,KAAKmO,kBAAkBjE,EAAOE,EAAYC,IAEhEiF,EAAQ,IAAIjP,MAAM,8CAA8C6J,MAGxEmF,EAAQ,CAACjF,EAAYC,SAErBiF,EAAO,IAAIjP,MAAM,+BAAiC6J,QAWlEiE,iBAAAA,CAAkBvC,EAAiBxB,EAAwBC,GACvD,OAAQuB,GACJ,KAAKN,EAAqBW,YAAYL,QAClC,OAAOxB,EAAWoF,sBAAwBnF,EAAaoF,uBAC3D,KAAKnE,EAAqBgB,oBAAoBV,QAC1C,OAAOxB,EAAWsF,6BAA+BrF,EAAasF,8BAClE,KAAKrE,EAAqBkC,YAAY5B,QAClC,OAAOxB,EAAWwF,sBAAwBvF,EAAawF,uBAC3D,KAAKvE,EAAqBoC,WAAW9B,QACjC,OAAOxB,EAAW0F,qBAAuBzF,EAAa0F,sBAC1D,KAAKzE,EAAqBsC,UAAUhC,QAChC,OAAOxB,EAAW4F,qBAAuB3F,EAAa4F,sBAC1D,KAAK3E,EAAqB8B,KAAKxB,QAC3B,OAAOxB,EAAW8F,gBAAkB7F,EAAa8F,iBACrD,KAAK7E,EAAqBuC,oBAAoBjC,QAC1C,OAAOxB,EAAWgG,6BAA+B/F,EAAagG,8BAClE,KAAK/E,EAAqBgC,MAAM1B,QAC5B,OAAOxB,EAAWkG,iBAAmBjG,EAAakG,kBACtD,KAAKjF,EAAqBoB,iBAAiBd,QACvC,OAAOxB,EAAWoG,2BAA6BnG,EAAaoG,4BAChE,KAAKnF,EAAqBsB,2BAA2BhB,QACjD,OAAOxB,EAAWsG,mCAAqCrG,EAAasG,oCACxE,KAAKrF,EAAqBwB,gBAAgBlB,QACtC,OAAOxB,EAAWwG,0BAA4BvG,EAAawG,2BAC/D,KAAKvF,EAAqB4B,2BAA2BtB,QACjD,OAAOxB,EAAW0G,mCAAqCzG,EAAa0G,oCACxE,KAAKzF,EAAqBwC,cAAclC,QACpC,OAAOxB,EAAW4G,wBAA0B3G,EAAa4G,yBAC7D,QACI,OAAO,GAUnB1D,cAAAA,GACI,OAAOvN,KAAKmL,aAAa+C,EAAoBK,uBASjDd,aAAAA,GACI,OAAOzN,KAAKmL,aAAa+C,EAAoBM,sBASjDrB,QAAAA,GACI,OAAOnN,KAAKmL,aAAa+C,EAAoBQ,iBASjDrB,SAAAA,GACI,OAAOrN,KAAKmL,aAAa+C,EAAoBU,kBAyBjDrC,YAAAA,CAAaC,GACT,GAAIC,EAAiBhC,IAAI+B,GACrB,OAAOxM,KAAKmL,aAAa+C,EAAoBW,4BAC1C,GAAIlC,EAA2BlC,IAAI+B,GACtC,OAAOxM,KAAKmL,aAAa+C,EAAoBY,oCAC1C,GAAIjC,EAAgBpC,IAAI+B,GAC3B,OAAOxM,KAAKmL,aAAa+C,EAAoBa,2BAC1C,GAAIhC,EAA0BtC,IAAI+B,GACrC,OAAOxM,KAAKmL,aAAa+C,EAAoBc,mCAC1C,GAAI/B,EAA2BxC,IAAI+B,GACtC,OAAOxM,KAAKmL,aAAa+C,EAAoBe,oCAE7C,MAAM,IAAI5O,MAAM,2BASxB,sBAAM4N,GACF,OAAOjO,KAAKmL,aAAa+C,EAAoBgB,yBAUjDgC,oBAAAA,CAAqB9G,GACjB,IAAIA,EAAWoF,qBAGX,MAAM,IAAInP,MAAM,4DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaiG,qBAAqB5G,YAa1H6G,2BAAAA,CAA4BhH,GACxB,IAAIA,EAAWsF,4BAGX,MAAM,IAAIrP,MAAM,oEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBgB,oBAAoBV,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAamG,4BAA4B9G,YAazI+G,oBAAAA,CAAqBlH,GACjB,IAAIA,EAAWwF,qBAGX,MAAM,IAAIvP,MAAM,4DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBkC,YAAY5B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaqG,qBAAqBhH,YAa1HiH,mBAAAA,CAAoBpH,GAChB,IAAIA,EAAW0F,oBAGX,MAAM,IAAIzP,MAAM,2DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBoC,WAAW9B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAauG,oBAAoBlH,YAaxHmH,cAAAA,CAAetH,GACX,IAAIA,EAAW8F,eAGX,MAAM,IAAI7P,MAAM,qDAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqB8B,KAAKxB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAayG,eAAepH,YAa7GqH,2BAAAA,CAA4BxH,GACxB,IAAIA,EAAWgG,4BAGX,MAAM,IAAI/P,MAAM,oEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBuC,oBAAoBjC,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa2G,4BAA4BtH,YAazIuH,eAAAA,CAAgB1H,GACZ,IAAIA,EAAWkG,gBAGX,MAAM,IAAIjQ,MAAM,sDAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBgC,MAAM1B,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa6G,gBAAgBxH,YAa/GyH,yBAAAA,CAA0B5H,GACtB,IAAIA,EAAWoG,0BAGX,MAAM,IAAInQ,MAAM,iEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBoB,iBAAiBd,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAa+G,0BAA0B1H,YAapI2H,iCAAAA,CAAkC9H,GAC9B,IAAIA,EAAWsG,kCAGX,MAAM,IAAIrQ,MAAM,2EAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBsB,2BAA2BhB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaiH,kCAAkC5H,YAatJ6H,wBAAAA,CAAyBhI,GACrB,IAAIA,EAAWwG,yBAGX,MAAM,IAAIvQ,MAAM,gEAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBwB,gBAAgBlB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAamH,yBAAyB9H,YAalI+H,iCAAAA,CAAkClI,GAC9B,IAAIA,EAAW0G,kCAGX,MAAM,IAAIzQ,MAAM,2EAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqB4B,2BAA2BtB,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAaqH,kCAAkChI,YAMtJiI,sBAAAA,CAAuBpI,GACnB,IAAIA,EAAW4G,uBAGX,MAAM,IAAI3Q,MAAM,8DAFhBL,KAAKqJ,MAAMiB,IAAIgB,EAAqBwC,cAAclC,QAAS,CAACxB,EAAWG,UAAWW,EAAAA,GAAauH,uBAAuBlI,aChclI,MAAMmI,EACFvP,QACAwP,cACA7S,WAAAA,CAAYqD,EAAkBwP,GAC1B3S,KAAKmD,QAAUA,EACfnD,KAAK2S,cAAgBA,EAQzBvP,UAAAA,CAAWD,GACPnD,KAAKmD,QAAUA,EA+BnB,wBAAMyP,CAAmBvM,EAAwBwM,EAAkB/O,EAAmBgP,GAClF,IAAIpP,EAAc,EACdC,EAAY,EAahB,GAXImP,IACI,gBAAiBA,GAA4D,iBAAjCA,EAA4B,YACxEpP,EAAcoP,EAA8B,aAG5C,cAAeA,GAA4D,iBAAjCA,EAA4B,YACtEnP,EAAYmP,EAA4B,YAK/B,GAAbnP,EAAgB,CAChB,MAAMO,QAAYlE,KAAK2S,cAAcjO,kBACrC,GAAIR,aAAe7D,MACf,MAAM0H,EAAY,uDAEtBpE,EAAYO,EAIhB,GAAIR,GAAeC,EACf,MAAMoE,EAAY,6CAGtB,aAAa/H,KAAK2S,cAAclP,mBAAmBC,EAAaC,EAAW3D,KAAKmD,QAAQnC,aAAcqF,OAAckJ,EAAWzL,GA8BnI,uBAAMiP,CAAkB1M,EAAsBwM,EAAkB/O,EAAmBgP,GAC/E,MAAM/O,QAAgB/D,KAAK4S,mBAAmB,CAACvM,GAAewM,EAAS/O,EAAQgP,GAC/E,QAAM/O,aAAmB1D,QAAU0D,EAAQe,OAAS,EACzCf,EAAQ,IAEnB5D,QAAQC,MAAM,+BAAgC2D,GACvC,IAAI1D,MAAM,qBAMrB,gBAAM2S,CAAWH,EAAkB/O,EAAmBgP,GAClD,MAAM,IAAIzS,MAAM,2BAMpB,iBAAM4S,CAAYJ,EAAkB/O,EAAmBgP,GACnD,MAAM,IAAIzS,MAAM,4BAuBxB,MAAM6S,EACFxP,YACAC,UACA7D,WAAAA,CAAY4D,EAAqBC,GAC7B3D,KAAK0D,YAAcA,EACnB1D,KAAK2D,UAAYA,GCjSzB,IAAIwP,EAAoC,KAElC,MAAAC,EAAmBA,KACrB,IAAKD,EAAiB,CAClB,MAAME,EAAS,IAAIC,OAAO,IAAIC,IAAI,kBAA+B,CAC7DrO,UAAM,IAEViO,GAAkBK,EAAAA,EAAAA,IAAgBH,GAEtC,OAAOF,CAAe,ECkD1B,MAAMM,EACFtQ,QACAuQ,YACAzQ,KACA0P,cACAgB,eAQA7T,WAAAA,CAAYmD,EAA2ByQ,EAA+CC,GAClF3T,KAAKiD,KAAOA,GAAc,mCAC1BjD,KAAK2S,cAAgB,IAAI3P,EAAkBhD,KAAKiD,MAEhDjD,KAAK0T,YAAcA,GAA4B,IAAItK,EACnDpJ,KAAK2T,eAAiBA,EAQ1BvQ,UAAAA,CAAWD,GACPnD,KAAKmD,QAAUA,EAQnByQ,cAAAA,CAAeF,GACX1T,KAAK0T,YAAcA,EAQvBpQ,OAAAA,CAAQL,GACJjD,KAAKiD,KAAOA,EACZjD,KAAK2S,cAAcrP,QAAQL,GAQ/B4Q,iBAAAA,CAAkBF,GACd3T,KAAK2T,eAAiBA,EAkC1B,YAAMG,CACFtO,EACAuO,EACAC,EACAC,EACAC,EACAlT,GAGA,IACI,MAAMmT,EAAgBxN,EAAAA,GAAQ9F,WAAW2E,GACzC,IAAIoC,EACJ,IACIA,QAAsB5H,KAAK2S,cAAczL,WAAWiN,EAAc9L,MACpE,MAAOnI,GAELC,QAAQiU,IAAe,WAAAD,EAAc9L,oDAEzC,GAA4B,iBAAjBT,EACP,KAAO,WAAWuM,EAAc9L,iEAEtC,MAAOnI,GACL,MAAM6H,EAAY,6BAA6B7H,KAInD,IAiBImU,EAjBAC,EAAuBtT,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDmR,EAAuBtU,KAAKmD,QAAQnC,mBAGJ,IAAzBsT,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,EAClH,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,uGAK5E,IACImU,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC5H,MAAOvN,GACL,MAAM6H,EAAY,iDAAiD7H,gEAEvE,MAAOsU,EAAeC,GAAmBJ,EAGzC,IAAI9M,EACJ,IACIA,QAAgBvH,KAAK2S,cAAcrL,kBAAkB9B,GACvD,MAAOtF,GACL,MAAM6H,EAAY,qDAAqD7H,0GAI3E,MAAMwU,QAAWC,EAAAA,EAAmBC,2BAA2BN,EAAsB9O,EAASuO,EAAKG,EAAWlU,KAAKiD,KAAMsE,EAASiN,EAAeC,GACjJ,aAAazU,KAAK2S,cAAclK,kBAAkBiM,GA8BtD,+BAAMG,CAA0BpS,GAE5B,MAAM,YACFqS,EAAW,aACXC,EAAY,IACZhB,EAAG,WACHC,EAAU,OACVgB,EAAM,mBACNf,EAAkB,gBAClBgB,EAAe,WACfjU,EAAU,aACVkU,GACAzS,EAEJ,IAAIyR,EAAYzR,EAAQyR,UACpB9J,EAAa3H,EAAQ2H,WACrBC,EAAe5H,EAAQ4H,aACvB7E,EAAU/C,EAAQ+C,QAClB+B,EAAU9E,EAAQ8E,QAGtB,QAAgBgI,IAAZ/J,EACA,IACIA,QAAyBxF,KAAK2S,cAAczL,WAAW4N,GACzD,MAAO5U,GACL,MAAM6H,EAA6B,iBAAA+M,yBAAmC5U,2GAEnEsF,aAAmBmB,EAAAA,KAC1BnB,EAAUA,EAAQjE,YAItB,IAiBI8S,EAjBAc,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAIV,IACIjB,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,EAClH,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,uGAK5E,IACImU,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC5H,MAAOvN,GACL,MAAM6H,EAAY,iDAAiD7H,gEAEvE,MAAOsU,EAAeC,GAAmBJ,EAGzC,IAAKjK,IAAeC,EAChB,KACKD,EAAYC,SAAuCrK,KAAK0T,YAAYvI,aAAa8J,GACpF,MAAO/U,GACLC,QAAQiU,IAAI,kDAAkDlU,6CAMtE,GADwByG,EAAAA,GAAQ9F,WAAW2E,GAASiC,aAAa3C,OAC3C,IAAMyC,EACxB,IACIA,QAAgCvH,KAAK2S,cAAcrL,kBAAkBwN,GACvE,MAAO5U,GACL,MAAM6H,EAAY,qDAAqD7H,0GAK/E,aAAayU,EAAAA,EAAmBE,0BAA0BM,EAAqB3P,EAASuP,EAAcC,EAAQjB,EAAKG,EAAWlU,KAAKiD,KAAMsE,EAAS6C,EAAYC,EAAcmK,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQ3S,GACV,MAAMiS,QAAwB1U,KAAK6U,0BAA0BpS,GAC7D,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAoCtD,SAAMW,CACF7P,EACA8P,EACAN,EACAO,EACAhO,EACA0N,EACA7K,EACAC,EACArJ,EACAkU,GAGA,IAAIC,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAIV,IAAK/K,IAAeC,EAChB,KACKD,EAAYC,SAAuCrK,KAAK0T,YAAYvI,aAAa8J,GACpF,MAAO/U,GACLC,QAAQiU,IAAI,kDAAkDlU,6CAQtE,OAHAC,QAAQiU,IAAI,2BACZjU,QAAQiU,IAAI,gBAAiBhK,GAC7BjK,QAAQiU,IAAI,kBAAmB/J,GACxBsK,EAAAA,EAAmBa,uBAAuBL,EAAqB3P,EAAS8P,EAAeN,EAAQO,GAAgB,EAAOhO,EAAS6C,EAAYC,EAAcrK,KAAKiD,KAAMiS,GAiB/K,UAAM9H,CACFqI,EACAC,EACA3B,EACAC,EACAC,EACAC,EACAlT,EACAkU,GAGA,IAUIb,EACAlH,EAXAgI,EAAsBnU,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBhB,KAAKmD,UACjDgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC1HN,QAAkCnN,KAAK0T,YAAYvG,WACrD,MAAOjN,GACL,MAAM6H,EAAY,iDAAiD7H,gEAEvE,MAAOsU,EAAeC,GAAmBJ,GAClCsB,EAAgBC,GAAoBzI,EAG3C,IACI+G,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB1E,EAClH,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,uGAI5E,IACIuV,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBhV,WAAW4U,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBhV,WAAW6U,GAC5F,MAAOxV,GACL,MAAM6H,EAAY,mFAItB,MAAM2M,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW3B,EAAKG,EAAWlU,KAAKiD,KAAM0S,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAyBtD,WAAMpH,CAAMyI,EAAqBC,EAAwChV,EAAyBkU,GAE9F,IAUI7H,EAVA8H,EAAsBnU,EAK1B,QAJmC,IAAxBmU,QAA+D,IAAjBnV,KAAKmD,UAC1DgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAKV,IACI9H,QAAmCrN,KAAK0T,YAAYrG,YACtD,MAAOnN,GACL,MAAM6H,EAAY,iDAAiD7H,gEAEvE,MAAO+V,EAAiBC,GAAqB7I,EAG7C,IACI2I,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBhV,WAAWmV,GACrG,MAAO9V,GACL,MAAM6H,EAAY,+EAItB,MAAM2M,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAchW,KAAKiD,KAAMgT,EAAiBC,EAAmBhB,GACzJ,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAatD,oBAAM0B,CACF5Q,EACA6Q,EACArB,EACAhU,GAGA,IAAIuG,EAEA4N,EAAsBnU,OACS,IAAxBmU,IAEHA,OADwB,IAAjBnV,KAAKmD,QACUnD,KAAKmD,QAAQnC,aAEb,IAAIF,EAAAA,IAKlC,IACIyG,QAAgBvH,KAAK2S,cAAcrL,kBAAkB9B,GACrD,MAAMqG,QAAgB8I,EAAAA,EAAmB2B,kBACrCnB,EACA3P,EACA6Q,EACArB,EACAzN,GAEJ,MAAO,CAAasE,EAAQzB,aAA4ByB,EAAQxB,gBAClE,MAAOnK,GACL,MAAM6H,EAAY,qCAAqC7H,sEAiC/D,8BAAMqW,CACFC,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACAlT,EACAkU,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUIrC,EACA9H,EAXA4I,EAAsBnU,EAK1B,QAJmC,IAAxBmU,QAA+D,IAAjBnV,KAAKmD,UAC1DgS,EAAsBnV,KAAKmD,QAAQnC,mBAGJ,IAAxBmU,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoChU,KAAK0T,YAAYnG,uBAA0CvN,KAAK0T,YAAYjG,gBAC1HlB,QAAsCvM,KAAK0T,YAAYnH,aAAamK,GACtE,MAAOxW,GACL,MAAM6H,EAAY,iDAAiD7H,gEAEvE,MAAOsU,EAAeC,GAAmBJ,GAClCuC,EAAoBC,GAAwBtK,EAGnD,IAEI,MAAMzI,EAAmB,GACrBgT,EAAqBJ,IAErBV,QAAsChW,KAAKuU,iBAAiBR,EAAK,GAAIiC,EAAc/B,GACnFnQ,EAAOsC,KAAK4P,EAAajQ,UAEzBiQ,OAAezG,EAEnB2E,EAAYF,QAAoChU,KAAKuU,iBAAiBR,EAAKjQ,EAAQoQ,EAAWD,QAAsB1E,EACtH,MAAOrP,GACL,MAAM6H,EAAY,sDAAsD7H,uGAI5E,aAAayU,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAcjC,EAAKG,EAAWlU,KAAKiD,KAAM2T,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA1C,EACA/S,EACAkU,GAEA,OAAOlV,KAAKuW,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOxE,OAAWA,OAAWA,EAAWvO,EAAYkU,GAmB/H,4CAAM8B,CACFR,EACAC,EACA1C,EACA/S,EACAkU,GAEA,OAAOlV,KAAKuW,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOxE,OAAWA,OAAWA,EAAWvO,EAAYkU,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACAlT,EACAkU,GAEA,MAAMR,QAAwB1U,KAAKuW,yBAAyBC,EAAQC,EAAWC,EAAc3C,EAAKC,EAAYC,EAAoB+B,EAAc9B,EAAWlT,EAAYkU,GACvK,aAAalV,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB/T,EAAmC,CAAC,GAChK,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BhB,EAAMtR,EAAQsR,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa/V,iBAAgB,gBACjG0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBW,YAAYD,OAC5C9C,YAAaoC,EAAqBW,YAAY0B,SAC9CxE,SAAU,6BACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB/T,EAAmC,CAAC,GAC/I,MAAMiS,QAAwB1U,KAAKkX,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ/T,GAC7H,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBrV,EAAmC,CAAC,GAC/J,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BhB,EAAMtR,EAAQsR,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa/V,gBAAiB,GAAGwW,EAAmBxW,gBAAe,gBACvH0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBc,eAAeJ,OAC/C9C,YAAaoC,EAAqBc,eAAeuB,SACjDxE,SAAU,gCACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBrV,EAAmC,CAAC,GAC/I,MAAMiS,QAAwB1U,KAAK6X,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYrV,GAC5H,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB/T,EAAmC,CAAC,GAC3G,MAAM6U,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BhB,EAAMtR,EAAQsR,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAgB,GAAGG,EAAa/V,iBAAgB,gBAC1D0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBwC,cAAc9B,OAC9C9C,YAAaoC,EAAqBwC,cAAcH,SAChDxE,SAAU,+BACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,OAAO1X,KAAK6U,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB/T,EAAmC,CAAC,GAC3F,MAAMiS,QAAwB1U,KAAKiY,6BAA6Bd,EAAgBX,EAAQ/T,GACxF,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAyBtD,uCAAMyD,CAAkChB,EAAwB1U,EAAmC,CAAC,GAChG,MAAM,YACFqS,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAMtR,EAAQsR,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBgB,oBAAoBN,OACpD9C,YAAaoC,EAAqBgB,oBAAoBqB,SACtDxE,SAAU,qCACZ,QACF3D,EAAUxF,KAAKyX,oBACZC,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAK6U,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwB1U,EAAmC,CAAC,GAChF,MAAMiS,QAAwB1U,KAAKmY,kCAAkChB,EAAgB1U,GACrF,aAAazC,KAAK2S,cAAclK,kBAAkBiM,GAiCtD,uCAAM2D,CAAkCC,EAA0B7V,EAAmC,CAAC,GAClG,MAAM,YACFqS,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBgB,EAAS,CAACsD,EAAgB/W,YAAW,gBACrC0T,EAAkB,IAAIlM,EAAsB,CACxCE,UAAWqC,EAAqBuC,oBAAoB7B,OACpD9C,YAAaoC,EAAqBuC,oBAAoBF,SACtDxE,SAAU,wCAEXuO,GACHjV,EAEEkV,EAAiC,CACnC7C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGyC,GAGP,aAAa1X,KAAKoV,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B7V,EAAmC,CAAC,GAClF,MAAMiS,QAAmB1U,KAAKqY,kCAAkCC,EAAiB7V,GACjF,OAAOzC,KAAK2S,cAAclK,kBAAkBiM,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMrT,EAAuBqT,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCnT,EAAUiT,EAAkBvR,aAC5BmD,EAAeoO,EAAkB/M,kBACvC,OAAOkN,EAAAA,EAAAA,IAAwBxT,EAAWiF,EAAc7E,EAAS6Q,GACnE,MAAMnW,GAEJ,OADAC,QAAQoG,KAAK,6EACN,GAUfsS,uBAAAA,CAAwBrT,GACpB,OAAOmB,EAAAA,GAAQ9F,WAAW2E,GAQ9BiS,cAAAA,GACI,OAAO9Q,EAAAA,GAAQmS,oBAQnBC,aAAAA,CAAcvT,GACV,IAEI,OADSmB,EAAAA,GAAQ9F,WAAW2E,IACrB,EACT,MAAOtF,GACL,OAAO,GAKf,sBAAMqU,CAAiBiC,EAAgB1S,EAAkB8B,EAAmC7F,GACxF,IACI,OAAO6F,aAAkBiQ,EAAAA,GAAkBjQ,EAASiQ,EAAAA,GAAgBhV,WAAmB+E,GACzF,MAAO1F,GACL,IACI,MAAMyT,EAAiC3T,KAAK2T,eAC5C,aAA+BA,EAAeZ,kBAAkByD,GAAQ,EAAM1S,EAAQ/D,GACxF,MAAOG,GACL,MAAM6H,EAAY,sDAAsD7H,0GAOxF,SAAS4W,EAAqBJ,GAC1B,OAAOsC,EAAuBvO,IAAIiM,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOuC,EAAqBxO,IAAIiM,GAAgBA,EAC5C3O,EAAY,0BAA0B2O,8FAC9C,CCjwCA,MAAM9M,EAAYsP,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAMhP,EAAgBa,EAAAA,GAAqBmO,EAAShP,cAEpD,IAAKA,EACD,MAAM,IAAIhK,MAAM,wBAA0BgZ,EAAShP,cAGvD,MAAO,CACHrB,KAAMqQ,EAASrQ,KACf4C,QAASyN,EAASzN,QAClBI,OAAQqN,EAASrN,OACjB2B,SAAU0L,EAAS1L,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAamN,EAAQF,EAAAA,GAASjN,eAC9BG,eAAgBgN,EAAQF,EAAAA,GAAS9M,kBACjCE,oBAAqB8M,EAAQF,EAAAA,GAAS5M,uBACtCkB,YAAa4L,EAAQF,EAAAA,GAAS1L,eAC9BE,WAAY0L,EAAQF,EAAAA,GAASxL,cAC7BE,UAAWwL,EAAQF,EAAAA,GAAStL,aAC5BR,KAAMgM,EAAQF,EAAAA,GAAS9L,QACvBS,oBAAqBuL,EAAQF,EAAAA,GAASrL,uBACtCP,MAAO8L,EAAQF,EAAAA,GAAS5L,SACxBZ,iBAAkB0M,EAAQF,EAAAA,GAASxM,oBACnCE,2BAA4BwM,EAAQF,EAAAA,GAAStM,8BAC7CE,gBAAiBsM,EAAQF,EAAAA,GAASpM,mBAClCE,0BAA2BoM,EAAQF,EAAAA,GAASlM,6BAC5CE,2BAA4BkM,EAAQF,EAAAA,GAAShM,8BAC7CY,cAAesL,EAAQF,EAAAA,GAASpL,iBAChCvC,OAAQ,SAASzD,GACb,OAAI9H,KAAK2H,eAAeG,GACZ9H,KAAa8H,GAEd,IAAIzH,MAAM,QAAQyH,mBAK/BkR,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE7M,EAAmB,IAAI6M,IAAI,CAC7B,UACA,mBACA,oBAEE3M,EAA6B,IAAI2M,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEzM,EAAkB,IAAIyM,IAAI,CAC5B,SACA,kBACA,mBAEEvM,EAA4B,IAAIuM,IAAI,CACtC,mBACA,4BACA,2BAEErM,EAA6B,IAAIqM,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAASvR,EAAY5F,GAEjB,MADAhC,QAAQC,MAAM+B,GACRA,CACV,CA+BAG,eAAeiX,IACXpZ,QAAQoG,KAAK,6DACjB,+DChJA,SAASiT,EAAYhX,EAAKiX,EAAQC,EAAQpY,GAClC,OAAO,IAAI8N,SAASC,IAChB,MAAMgE,EAAS,IAAIC,OAAO9Q,EAAK,CAC3B0C,KAAM,WAGVmO,EAAOsG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPxK,EAAQgE,GAIJA,EAAOyG,OACPzG,EAAOyG,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGV3G,EAAO4G,YAAY,CACfR,SACAC,SACApY,WACF,GAEd,CAEA,IAAI4Y,sMAEJ,MAAMC,EAAO,IAAInW,MAAM,KAAKoW,UAAK7K,GAIjC,SAAS8K,EAAUC,GAAO,OAAOH,EAAKG,EAAK,CAF3CH,EAAK/T,UAAKmJ,EAAW,MAAM,GAAM,GAIjC,IAAIgL,EAAYJ,EAAKrV,OAErB,SAAS0V,EAAWF,GACZA,EAAM,MACVH,EAAKG,GAAOC,EACZA,EAAYD,EAChB,CAEA,SAASG,EAAWH,GAChB,MAAMI,EAAML,EAAUC,GAEtB,OADAE,EAAWF,GACJI,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAM1a,MAAM,4BAA4B,GAE5J,oBAAhBua,aAA+BD,EAAkBI,SAC5D,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWhB,EAAKR,OAAOwB,SACzEF,EAAqB,IAAIrR,WAAWuQ,EAAKR,OAAOwB,SAE7CF,CACX,CAEA,SAASG,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPT,EAAkBI,OAAOE,IAAkBK,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfjB,IAAcJ,EAAKrV,QAAQqV,EAAK/T,KAAK+T,EAAKrV,OAAS,GACvD,MAAMwV,EAAMC,EAIZ,OAHAA,EAAYJ,EAAKG,GAEjBH,EAAKG,GAAOkB,EACLlB,CACX,CAEA,IAAImB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMvb,MAAM,4BAA4B,GAE/Iwb,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKzR,IAAI0R,GACF,CACHC,KAAMH,EAAIhX,OACVoX,QAASF,EAAIlX,OAErB,EAEA,SAASqX,EAAkBL,EAAKM,EAAQC,GAEpC,QAAgB9M,IAAZ8M,EAAuB,CACvB,MAAML,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMgB,EAAOJ,EAAIlX,OAAQ,KAAO,EAGtC,OAFAmW,IAAkBqB,SAASlB,EAAKA,EAAMY,EAAIlX,QAAQwF,IAAI0R,GACtDP,EAAkBO,EAAIlX,OACfsW,CACf,CAEI,IAAIC,EAAMS,EAAIhX,OACVsW,EAAMgB,EAAOf,EAAK,KAAO,EAE7B,MAAMkB,EAAMtB,IAEZ,IAAIuB,EAAS,EAEb,KAAOA,EAASnB,EAAKmB,IAAU,CAC3B,MAAMC,EAAOX,EAAIY,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAInB,EAAMoB,GAAUC,CAC5B,CAEI,GAAID,IAAWnB,EAAK,CACD,IAAXmB,IACAV,EAAMA,EAAIR,MAAMkB,IAEpBpB,EAAMiB,EAAQjB,EAAKC,EAAKA,EAAMmB,EAAsB,EAAbV,EAAIhX,OAAY,KAAO,EAC9D,MAAMiX,EAAOd,IAAkBqB,SAASlB,EAAMoB,EAAQpB,EAAMC,GAG5DmB,GAFYX,EAAaC,EAAKC,GAEhBG,QACdd,EAAMiB,EAAQjB,EAAKC,EAAKmB,EAAQ,KAAO,CAC/C,CAGI,OADAf,EAAkBe,EACXpB,CACX,CAEA,SAASuB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB3B,SAAWhB,EAAKR,OAAOwB,SACzE2B,EAAqB,IAAIE,WAAW7C,EAAKR,OAAOwB,SAE7C2B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM/X,SAAc+X,EACpB,GAAY,UAAR/X,GAA4B,WAARA,GAA4B,MAAP+X,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR/X,EACA,MAAQ,IAAG+X,KAEf,GAAY,UAAR/X,EAAkB,CAClB,MAAMgY,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAARhY,EAAoB,CACpB,MAAM8D,EAAOiU,EAAIjU,KACjB,MAAmB,iBAARA,GAAoBA,EAAKlE,OAAS,EACjC,YAAWkE,KAEZ,UAEnB,CAEI,GAAIhF,MAAMmZ,QAAQF,GAAM,CACpB,MAAMnY,EAASmY,EAAInY,OACnB,IAAI+F,EAAQ,IACR/F,EAAS,IACT+F,GAASmS,EAAYC,EAAI,KAE7B,IAAI,IAAIpY,EAAI,EAAGA,EAAIC,EAAQD,IACvBgG,GAAS,KAAOmS,EAAYC,EAAIpY,IAGpC,OADAgG,GAAS,IACFA,CACf,CAEI,MAAMuS,EAAiB,sBAAsBC,KAAK9b,SAAS+b,KAAKL,IAChE,IAAIM,EACJ,KAAIH,EAAetY,OAAS,GAIxB,OAAOvD,SAAS+b,KAAKL,GAEzB,GALIM,EAAYH,EAAe,GAKd,UAAbG,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUR,GAAO,GACrD,CAAU,MAAOS,GACL,MAAO,QACnB,CAGI,OAAIT,aAAe5c,MACP,GAAE4c,EAAIjU,SAASiU,EAAI9a,YAAY8a,EAAIU,QAGxCJ,CACX,CAEA,MAAMK,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B9D,EAAK+D,oBAAoB1b,IAAIyb,EAAME,KAAnChE,CAAyC8D,EAAMG,EAAGH,EAAMI,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMR,EAAQ,CAAEG,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbX,EAAMS,MACN,MAAMN,EAAIH,EAAMG,EAChBH,EAAMG,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGH,EAAMI,KAAMO,EACpC,CAAU,QACsB,KAAdX,EAAMS,KACRvE,EAAK+D,oBAAoB1b,IAAIyb,EAAME,KAAnChE,CAAyCiE,EAAGH,EAAMI,GAClDR,EAAcG,WAAWC,IAEzBA,EAAMG,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWZ,EAChBJ,EAAcE,SAASY,EAAMV,EAAOA,GAC7BU,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClC5E,EAAK6E,6HAA6HT,EAAMC,EAAMhD,EAAcuD,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI7e,MAAO,wBAAuB6e,EAAMlW,QAElD,OAAOiW,EAAS7D,GACpB,CAEA,SAAS+D,EAAkBrD,EAAKM,GAC5B,MAAMhB,EAAMgB,EAAoB,EAAbN,EAAIhX,OAAY,KAAO,EAG1C,OAFAmW,IAAkB3Q,IAAIwR,EAAKV,EAAM,GACjCK,EAAkBK,EAAIhX,OACfsW,CACX,CAiBA,SAASgE,EAAwBha,EAAW0G,EAAetG,EAAS6Q,GAChE,IACI,MAAMgJ,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAa5Z,EAAWma,GACxBP,EAAalT,EAAe0T,IAC5BR,EAAaxZ,EAASia,IACtB,MAAMC,EAAOvD,EAAkB9F,EAAa6D,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKtB,wBAAwByG,EAAQja,EAAU0a,UAAWhU,EAAcgU,UAAWta,EAAQsa,UAAWJ,EAAMG,GAC5G,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAc,IAAPD,CACf,CAAM,QACE7F,EAAKoF,gCAAgC,GAC7C,CACA,CAEA,IAAIW,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB/E,SAAWhB,EAAKR,OAAOwB,SAC/E+E,EAAwB,IAAIE,cAAcjG,EAAKR,OAAOwB,SAEnD+E,CACX,CAEA,SAASG,EAAoBhF,EAAKC,GAE9B,OADAD,KAAc,EACPH,IAAkBqB,SAASlB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAASgF,EAAeC,GACpBpG,EAAKmG,eAAeC,EACxB,CAOA,SAASC,EAAe/d,EAAKge,GAEzB,OAAO/F,EADKP,EAAKuG,eAAelF,EAAc/Y,GAAMge,GAExD,CAEA,SAASE,EAAYlC,EAAGG,GACpB,IACI,OAAOH,EAAEmC,MAAM3gB,KAAM2e,EAC7B,CAAM,MAAOze,GACLga,EAAK0G,qBAAqBrF,EAAcrb,GAChD,CACA,CACA,SAAS2gB,EAAkBvC,EAAMC,EAAMO,EAAMgC,GACzC5G,EAAK6G,gEAAgEzC,EAAMC,EAAMhD,EAAcuD,GAAOvD,EAAcuF,GACxH,CAEA,MAAME,EAAuD,oBAAzBnD,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK+G,mBAAmB7F,IAAQ,WAItE,MAAM5a,EAEF,aAAO0gB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO3gB,EAAQ4gB,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChB4F,EAAoBlD,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBkB,EAAoBjD,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK+G,mBAAmB7F,EAChC,CASI,uBAAO7a,CAAiBghB,GACpBvC,EAAauC,EAAaC,IAC1B,MAAM9G,EAAMR,EAAKuH,yBAAyBF,EAAYzB,WACtD,OAAOtf,EAAQ0gB,OAAOxG,EAC9B,CASI,oBAAOgH,CAAcC,GACjB3C,EAAa2C,EAAUC,IACvB,MAAMlH,EAAMR,EAAK2H,sBAAsBF,EAAS7B,WAChD,OAAOtf,EAAQ0gB,OAAOxG,EAC9B,CASI,kBAAOtZ,CAAYE,GACf,MAAMoe,EAAOvD,EAAkB7a,EAAS4Y,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPf,EAAMR,EAAK4H,oBAAoBpC,EAAMG,GAC3C,OAAOrf,EAAQ0gB,OAAOxG,EAC9B,CAQIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK+H,kBAAkB5C,EAAQrf,KAAK8f,WACpC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI5f,MAAAA,CAAOD,EAASE,GACZ,MAAMqd,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACbuD,EAAa3c,EAAW8f,IAExB,OAAe,IADHjI,EAAKkI,eAAepiB,KAAK8f,UAAWJ,EAAMG,EAAMxd,EAAUyd,UAE9E,GAGA,MAAMuC,EAAyD,oBAAzBxE,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoI,qBAAqBlH,IAAQ,WAIxE,MAAMmH,EAEF,aAAOrB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOoB,EAAUnB,WAGpC,OAFA5F,EAAIsE,UAAY1E,EAChBiH,EAAsBvE,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC5CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuC,EAAsBtE,WAAW/d,MAC1Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoI,qBAAqBlH,EAClC,CAKI7Z,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsI,mBAAmBnD,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOnhB,CAAWuE,GACd,IACI,MAAMia,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB/W,EAAW8U,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACbvB,EAAKuI,qBAAqBpD,EAAQK,EAAMG,GACxC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOuC,EAAUrB,OAAOnB,EACpC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMoD,EAAiE,oBAAzB7E,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKyI,6BAA6BvH,IAAQ,WAOhF,MAAMwH,EAEF,aAAO1B,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOyB,EAAkBxB,WAG5C,OAFA5F,EAAIsE,UAAY1E,EAChBsH,EAA8B5E,SAAStC,EAAKA,EAAIsE,UAAWtE,GACpDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB4C,EAA8B3E,WAAW/d,MAClCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKyI,6BAA6BvH,EAC1C,CAOIyH,UAAAA,GAEI,OAAOpI,EADKP,EAAK4I,6BAA6B9iB,KAAK8f,WAE3D,CAOIpH,YAAAA,GACI,MAAMgC,EAAMR,EAAK6I,+BAA+B/iB,KAAK8f,WACrD,OAAe,IAARpF,OAAYnL,EAAYgQ,EAAU2B,OAAOxG,EACxD,CAKI9P,OAAAA,GACI,IACI,MAAMyU,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8I,0BAA0B3D,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOiD,GAAQ/B,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI4D,aAAAA,GACI,MAAMxI,EAAMR,EAAKiJ,gCAAgCnjB,KAAK8f,WACtD,OAAe,IAARpF,OAAYnL,EAAY6T,GAAWlC,OAAOxG,EACzD,CAOIhP,eAAAA,GACI,MAAMgP,EAAMR,EAAKmJ,kCAAkCrjB,KAAK8f,WACxD,OAAON,GAAa0B,OAAOxG,EACnC,CAKI/B,aAAAA,GACI,IAAIoJ,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoJ,gCAAgCjE,EAAQrf,KAAK8f,WAClD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI9a,UAAAA,GACI,MAAMwT,EAAMR,EAAKqJ,6BAA6BvjB,KAAK8f,WACnD,OAAOL,GAAQyB,OAAOxG,EAC9B,GAGA,MAAM8I,EAAqD,oBAAzB3F,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKuJ,iBAAiBrI,IAAQ,WAGpE,MAAMsI,EAEF,aAAOxC,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOuC,EAAMtC,WAGhC,OAFA5F,EAAIsE,UAAY1E,EAChBoI,EAAkB1F,SAAStC,EAAKA,EAAIsE,UAAWtE,GACxCA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB0D,EAAkBzF,WAAW/d,MACtBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKuJ,iBAAiBrI,EAC9B,CAII7Z,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKyJ,eAAetE,EAAQrf,KAAK8f,WACjC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOnhB,CAAW+iB,GACd,IACI,MAAMvE,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkByH,EAAO1J,EAAKyF,kBAAmBzF,EAAK0F,oBAC7DC,EAAOpE,EACbvB,EAAK2J,iBAAiBxE,EAAQK,EAAMG,GACpC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO0D,EAAMxC,OAAOnB,EAChC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMwE,EAAuD,oBAAzBjG,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6J,mBAAmB3I,IAAQ,KAItE,MAAM6H,GAEF,aAAO/B,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO8B,GAAQ7B,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChB0I,EAAoBhG,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgE,EAAoB/F,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6J,mBAAmB3I,EAChC,CAUItb,WAAAA,CAAYiM,EAAaD,GACrBkT,EAAajT,EAAaqX,IAC1B,IAAI1D,EAAO3T,EAAYsV,qBACvBrC,EAAalT,EAAe0T,IAC5B,IAAIwE,EAAOlY,EAAcuV,qBACzB,MAAM3G,EAAMR,EAAK+J,YAAYvE,EAAMsE,GAEnC,OADAhkB,KAAK8f,UAAYpF,IAAQ,EAClB1a,IACf,CAOIoK,UAAAA,GACI,IACI,MAAMiV,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgK,mBAAmB7E,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOoD,GAAWlC,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOIjV,YAAAA,GACI,IACI,MAAMgV,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKiK,qBAAqB9E,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOR,GAAa0B,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,EAGA,MAAM8E,GAAwD,oBAAzBvG,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKmK,oBAAoBjJ,IAAQ,YAGvE,MAAMlC,EAEF,aAAOgI,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOjI,EAASkI,WAGnC,OAFA5F,EAAIsE,UAAY1E,EAChBgJ,GAAqBtG,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC3CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBsE,GAAqBrG,WAAW/d,MACzBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKmK,oBAAoBjJ,EACjC,CAII,QAAIpS,GACA,IAAI+Y,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoK,wBAAwBjF,EAAQrf,KAAK8f,WAC1C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAIhZ,CAAKsV,GACL,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKqK,wBAAwBvkB,KAAK8f,UAAWJ,EAAMG,EAC3D,CAII,WAAIjU,GACA,IAAImW,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsK,2BAA2BnF,EAAQrf,KAAK8f,WAC7C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIpW,CAAQ0S,GACR,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKuK,2BAA2BzkB,KAAK8f,UAAWJ,EAAMG,EAC9D,CAII,UAAI7T,GACA,IAAI+V,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwK,0BAA0BrF,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIhW,CAAOsS,GACP,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAKyK,0BAA0B3kB,KAAK8f,UAAWJ,EAAMG,EAC7D,CAII,YAAIlS,GACA,IAAIoU,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0K,4BAA4BvF,EAAQrf,KAAK8f,WAC9C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAIrU,CAAS2Q,GACT,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK2K,4BAA4B7kB,KAAK8f,UAAWJ,EAAMG,EAC/D,CAII,gBAAIxV,GACA,IAAI0X,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4K,gCAAgCzF,EAAQrf,KAAK8f,WAClD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI3X,CAAaiU,GACb,MAAMoB,EAAOvD,EAAkBmC,EAAMpE,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK6K,gCAAgC/kB,KAAK8f,UAAWJ,EAAMG,EACnE,CAII,cAAO1G,GACH,IAAI4I,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8K,iBAAiB3F,GACtB,IAAIU,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAO/V,GACH,MAAMyO,EAAMR,EAAK+K,uBACjB,OAAO/L,EAASgI,OAAOxG,EAC/B,CAII,qBAAOtO,GACH,MAAMsO,EAAMR,EAAKgL,0BACjB,OAAOhM,EAASgI,OAAOxG,EAC/B,CAII,0BAAOpO,GACH,MAAMoO,EAAMR,EAAKiL,+BACjB,OAAOjM,EAASgI,OAAOxG,EAC/B,CAII,kBAAOlN,GACH,MAAMkN,EAAMR,EAAKkL,uBACjB,OAAOlM,EAASgI,OAAOxG,EAC/B,CAII,iBAAOhN,GACH,MAAMgN,EAAMR,EAAKmL,sBACjB,OAAOnM,EAASgI,OAAOxG,EAC/B,CAII,gBAAO9M,GACH,MAAM8M,EAAMR,EAAKoL,qBACjB,OAAOpM,EAASgI,OAAOxG,EAC/B,CAII,WAAOtN,GACH,MAAMsN,EAAMR,EAAKqL,gBACjB,OAAOrM,EAASgI,OAAOxG,EAC/B,CAII,0BAAO7M,GACH,MAAM6M,EAAMR,EAAKsL,+BACjB,OAAOtM,EAASgI,OAAOxG,EAC/B,CAII,YAAOpN,GACH,MAAMoN,EAAMR,EAAKuL,iBACjB,OAAOvM,EAASgI,OAAOxG,EAC/B,CAII,uBAAOhO,GACH,MAAMgO,EAAMR,EAAKwL,4BACjB,OAAOxM,EAASgI,OAAOxG,EAC/B,CAII,iCAAO9N,GACH,MAAM8N,EAAMR,EAAKyL,sCACjB,OAAOzM,EAASgI,OAAOxG,EAC/B,CAII,sBAAO5N,GACH,MAAM4N,EAAMR,EAAK0L,2BACjB,OAAO1M,EAASgI,OAAOxG,EAC/B,CAII,gCAAO1N,GACH,MAAM0N,EAAMR,EAAK2L,qCACjB,OAAO3M,EAASgI,OAAOxG,EAC/B,CAII,iCAAOxN,GACH,MAAMwN,EAAMR,EAAK4L,sCACjB,OAAO5M,EAASgI,OAAOxG,EAC/B,CAII,oBAAO5M,GACH,MAAM4M,EAAMR,EAAK6L,yBACjB,OAAO7M,EAASgI,OAAOxG,EAC/B,GAGA,MAAMsL,GAA4D,oBAAzBnI,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK+L,wBAAwB7K,IAAQ,YAK3E,MAAM8K,EAEF,aAAOhF,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO+E,EAAa9E,WAGvC,OAFA5F,EAAIsE,UAAY1E,EAChB4K,GAAyBlI,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC/CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBkG,GAAyBjI,WAAW/d,MAC7Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK+L,wBAAwB7K,EACrC,CAKItb,WAAAA,CAAYqmB,GACR,IACI,MAAM9G,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBgK,EAAYjM,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAKkM,iBAAiB/G,EAAQK,EAAMG,GACpC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAGrB,OADAhgB,KAAK8f,UAAYC,IAAO,EACjB/f,IACnB,CAAU,QACEka,EAAKoF,gCAAgC,GACjD,CACA,CASI+G,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAMlH,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBmK,EAAYpM,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkBoK,EAAYrM,EAAKyF,kBAAmBzF,EAAK0F,oBAClE4G,EAAO/K,EACbvB,EAAKuM,0BAA0BpH,EAAQrf,KAAK8f,UAAWJ,EAAMG,EAAMmE,EAAMwC,GACzE,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWsF,EAEjC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAKI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwM,sBAAsBrH,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOnhB,CAAW8lB,GACd,IACI,MAAMtH,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBwK,EAAGzM,EAAKyF,kBAAmBzF,EAAK0F,oBACzDC,EAAOpE,EACbvB,EAAK0M,wBAAwBvH,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOkG,EAAahF,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMuH,GAA0D,oBAAzBhJ,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK4M,sBAAsB1L,IAAQ,YAIzE,MAAMta,EAEF,aAAOogB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOrgB,EAAWsgB,WAGrC,OAFA5F,EAAIsE,UAAY1E,EAChByL,GAAuB/I,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC7CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB+G,GAAuB9I,WAAW/d,MAC3Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK4M,sBAAsB1L,EACnC,CAMItb,WAAAA,GACI,MAAM4a,EAAMR,EAAK6M,iBAEjB,OADA/mB,KAAK8f,UAAYpF,IAAQ,EAClB1a,IACf,CASI,0BAAOmB,CAAoBD,GACvB,MAAMwe,EAAOP,EAAkBje,EAAMgZ,EAAKyF,mBACpCE,EAAOpE,EACPf,EAAMR,EAAK8M,+BAA+BtH,EAAMG,GACtD,OAAO/e,EAAWogB,OAAOxG,EACjC,CASI,kBAAOtZ,CAAYmgB,GACf,IACI,MAAMlC,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBoF,EAAarH,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAK+M,uBAAuB5H,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOlf,EAAWogB,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQIre,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgN,qBAAqB7H,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIxd,WAAAA,GACI,MAAMkW,EAAMR,EAAKiN,uBAAuBnnB,KAAK8f,WAC7C,OAAO8B,GAAQV,OAAOxG,EAC9B,CAOI0M,UAAAA,GACI,MAAM1M,EAAMR,EAAKmN,sBAAsBrnB,KAAK8f,WAC5C,OAAOwH,EAAQpG,OAAOxG,EAC9B,CASIxY,IAAAA,CAAKC,GACD,MAAMud,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACPf,EAAMR,EAAKqN,gBAAgBvnB,KAAK8f,UAAWJ,EAAMG,GACvD,OAAOsC,GAAUjB,OAAOxG,EAChC,CAUI,mBAAO8M,CAAaC,GAChB,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKwN,wBAAwBrI,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO2H,GAAqBzG,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAUI7d,YAAAA,CAAagmB,GACT,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK0N,wBAAwBvI,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC3D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO2H,GAAqBzG,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAWI,+BAAOve,CAAyBL,EAAY+mB,GACxC,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAate,EAAYinB,IACzB,MAAMjI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK2N,oCAAoCxI,EAAQ3e,EAAWof,UAAWJ,EAAMG,GAC7E,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOlf,EAAWogB,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAMwI,GAAoE,oBAAzBjK,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6N,gCAAgC3M,IAAQ,YAInF,MAAMxa,EAEF,aAAOsgB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOvgB,EAAqBwgB,WAG/C,OAFA5F,EAAIsE,UAAY1E,EAChB0M,GAAiChK,SAAStC,EAAKA,EAAIsE,UAAWtE,GACvDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgI,GAAiC/J,WAAW/d,MACrCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6N,gCAAgC3M,EAC7C,CAYI,wBAAO4M,CAAkBzG,EAAakG,GAClC,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK0N,wBAAwBvI,EAAQkC,EAAYzB,UAAWJ,EAAMG,GAClE,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOpf,EAAqBsgB,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAUI2I,mBAAAA,CAAoBR,GAChB,IACI,MAAMpI,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBsL,EAAQvN,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKgO,yCAAyC7I,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5E,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOwB,GAAWN,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKiO,8BAA8B9I,EAAQrf,KAAK8f,WAChD,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOnhB,CAAWH,GACd,IACI,MAAM2e,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBzb,EAAYwZ,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAKkO,gCAAgC/I,EAAQK,EAAMG,GACnD,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOpf,EAAqBsgB,OAAOnB,EAC/C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,GAGA,MAAM+I,GAAuD,oBAAzBxK,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoO,mBAAmBlN,IAAQ,YAItE,MAAMzU,EAEF,aAAOua,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOxa,EAAQya,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChBiN,GAAoBvK,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuI,GAAoBtK,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoO,mBAAmBlN,EAChC,CASI,iBAAOva,CAAW2E,GACd,IACI,MAAM6Z,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACbvB,EAAKqO,mBAAmBlJ,EAAQK,EAAMG,GACtC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOrZ,EAAQua,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsO,iBAAiBnJ,EAAQrf,KAAK8f,WACnC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASIyG,WAAAA,CAAYnT,GACR,MAAMoK,EAAOvD,EAAkB7G,EAAe4E,EAAKyF,kBAAmBzF,EAAK0F,oBACrEC,EAAOpE,EAEb,OAAe,IADHvB,EAAKwO,oBAAoB1oB,KAAK8f,UAAWJ,EAAMG,EAEnE,CAuBI8I,YAAAA,GAEI,OAAOlO,EADKP,EAAK0O,qBAAqB5oB,KAAK8f,WAEnD,CAyCI+I,iBAAAA,CAAkBvT,GACd,IACI,MAAM+J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB7G,EAAe4E,EAAKyF,kBAAmBzF,EAAK0F,oBACrEC,EAAOpE,EACbvB,EAAK4O,0BAA0BzJ,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC7D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAqBIyJ,WAAAA,GACI,IACI,MAAM1J,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK8O,oBAAoB3J,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAgCI2J,gBAAAA,CAAiBC,GACb,IACI,MAAM7J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKiP,yBAAyB9J,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAmDI8J,gBAAAA,CAAiBC,GACb,IACI,MAAMhK,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBkN,EAAanP,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKoP,yBAAyBjK,EAAQrf,KAAK8f,UAAWJ,EAAMG,GAC5D,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOvF,EAAWsF,EAC9B,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI,wBAAOxG,GACH,MAAM4B,EAAMR,EAAKqP,4BACjB,OAAO5iB,EAAQua,OAAOxG,EAC9B,CAOIrS,EAAAA,GACI,IAAI0Z,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsP,WAAWnK,EAAQrf,KAAK8f,WAC7B,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI1gB,OAAAA,GACI,IACI,MAAM+d,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKuP,gBAAgBpK,EAAQrf,KAAK8f,WAClC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOsH,EAAQpG,OAAOnB,EAClC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASIoK,OAAAA,CAAQC,GACJ3K,EAAa2K,EAAOhjB,GAEpB,OAAe,IADHuT,EAAK0P,gBAAgB5pB,KAAK8f,UAAW6J,EAAM7J,UAE/D,CA0BIrY,UAAAA,GAEI,OAAOgT,EADKP,EAAK2P,mBAAmB7pB,KAAK8f,WAEjD,GAGA,MAAMgK,GAA8D,oBAAzBjM,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK6P,0BAA0B3O,IAAQ,YAG7E,MAEIiG,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBgK,GAA2B/L,WAAW/d,MAC/Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK6P,0BAA0B3O,EACvC,CA8BI,iCAAOxG,CAA2B2M,EAAa/b,EAASwkB,EAAaC,EAAYznB,EAAK+E,EAAS2iB,EAAiBC,EAAmBC,GAC/HpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACb,IAAIuI,EAAO,EACNrH,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBrG,EAAOiG,EAAW5I,sBAEtB,IAAIiJ,EAAO3N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2K,EAAO9O,EACX,IAAI+O,EAAO,EACN7N,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoH,EAAON,EAAgB7I,sBAE3B,IAAIoJ,EAAO,EACN9N,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiL,EAAON,EAAkB9I,sBAE7B,IAAIqJ,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK0Q,0CAA0CrJ,EAAYzB,UAAWJ,EAAMG,EAAMmK,EAAahG,EAAMsG,EAAMC,EAAM5N,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUijB,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBrlB,EAAS+B,GAClC,MAAMmY,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EAEb,OAAOhB,EADKP,EAAK4Q,qCAAqCpL,EAAMG,EAAMlD,EAAWpV,GAAW,EAAIgU,EAAchU,IAElH,CAaI,8BAAOwjB,CAAwB/hB,GAC3B,IACI,MAAMqW,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBnT,EAAMkR,EAAKyF,kBAAmBzF,EAAK0F,oBAC5DC,EAAOpE,EACbvB,EAAK8Q,uCAAuC3L,EAAQK,EAAMG,GAC1D,IAAIE,EAAKG,IAAqBb,EAAS,EAAI,GACvC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,OAAO1mB,OAAO2mB,QAAQ,GAAInL,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAiCI,6BAAO9J,CAAuB+L,EAAa/b,EAAS2lB,EAAWnW,EAAQoW,EAAiB/hB,EAAO9B,EAASwE,EAAaD,EAAetJ,EAAK4nB,GACrIpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BkH,EAAOve,EAAYsV,sBAEvB,IAAImJ,EAAO,EACN7N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BgL,EAAO1e,EAAcuV,sBAEzB,IAAIoJ,EAAO9N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjFyL,EAAO5P,EACX,IAAIiP,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKoR,sCAAsC/J,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASoW,EAAiB/hB,EAAOsT,EAAWpV,GAAW,EAAIgU,EAAchU,GAAU+iB,EAAME,EAAMC,EAAMY,EAAMX,GAEvO,CAsCI,gCAAO7V,CAA0B0M,EAAa/b,EAAS2lB,EAAWnW,EAAQgV,EAAaC,EAAYznB,EAAK+E,EAASwE,EAAaD,EAAeoe,EAAiBC,EAAmBC,GAC7KpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBC,EAAOL,EAAW5I,sBAEtB,IAAImJ,EAAO7N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2L,EAAO9P,EACX,IAAIgP,EAAO,EACN9N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BqH,EAAO1e,EAAYsV,sBAEvB,IAAIqJ,EAAO,EACN/N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BkL,EAAO5e,EAAcuV,sBAEzB,IAAImK,EAAO,EACN7O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoI,EAAOtB,EAAgB7I,sBAE3B,IAAIoK,EAAO,EACN9O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiM,EAAOtB,EAAkB9I,sBAE7B,IAAIqK,EAAO,EACN/O,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5Be,EAAOtB,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKyR,yCAAyCpK,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASgV,EAAaM,EAAME,EAAMe,EAAM5O,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUkjB,EAAMC,EAAMc,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqBrK,EAAa/b,EAAS2lB,EAAWnW,EAAQxS,EAAK+E,EAASwE,EAAaD,EAAese,GAC3GpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACb,IAAI6O,EAAO3N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2K,EAAO9O,EACX,IAAI+O,EAAO,EACN7N,EAAW5Q,KACZiT,EAAajT,EAAaqX,IAC1BoH,EAAOze,EAAYsV,sBAEvB,IAAIoJ,EAAO,EACN9N,EAAW7Q,KACZkT,EAAalT,EAAe0T,IAC5BiL,EAAO3e,EAAcuV,sBAEzB,IAAIqJ,EAAO,EACN/N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BD,EAAON,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK2R,oCAAoCtK,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAASsV,EAAMC,EAAM5N,EAAWpV,GAAW,EAAIgU,EAAchU,GAAUijB,EAAMC,EAAMC,GAE7M,CAeI,0BAAOoB,CAAoBtmB,EAAS2lB,GAChC,IACI,MAAM9L,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkBgP,EAAWjR,EAAKyF,kBAAmBzF,EAAK0F,oBACjE4G,EAAO/K,EACbvB,EAAK6R,mCAAmC1M,EAAQK,EAAMG,EAAMmE,EAAMwC,GAClE,IAAIzG,EAAKG,IAAqBb,EAAS,EAAI,GACvC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,OAAO1mB,OAAO2mB,QAAQ,GAAInL,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CA6BI,2BAAOxJ,CAAqByL,EAAayK,EAAUC,EAAUjC,EAAaC,EAAYznB,EAAK0pB,EAAkBC,EAAoBjC,EAAiBC,EAAmBC,GACjKpL,EAAauC,EAAaC,IAC1BxC,EAAagN,EAAU3B,IACvB,IAAI3K,EAAOsM,EAAS3K,qBACpBrC,EAAaiN,EAAU5B,IACvB,IAAIrG,EAAOiI,EAAS5K,qBACpB,IAAIiJ,EAAO,EACN3N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBC,EAAOL,EAAW5I,sBAEtB,IAAImJ,EAAO7N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF2L,EAAO9P,EACX,IAAIgP,EAAO,EACN9N,EAAWuP,KACZlN,EAAakN,EAAkB9I,IAC/BqH,EAAOyB,EAAiB7K,sBAE5B,IAAIqJ,EAAO,EACN/N,EAAWwP,KACZnN,EAAamN,EAAoB3M,IACjCkL,EAAOyB,EAAmB9K,sBAE9B,IAAImK,EAAO,EACN7O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BoI,EAAOtB,EAAgB7I,sBAE3B,IAAIoK,EAAO,EACN9O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCiM,EAAOtB,EAAkB9I,sBAE7B,IAAIqK,EAAO,EACN/O,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5Be,EAAOtB,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKkS,oCAAoC7K,EAAYzB,UAAWJ,EAAMsE,EAAMgG,EAAaM,EAAME,EAAMe,EAAMd,EAAMC,EAAMc,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOvV,CAAsBoL,EAAa8K,EAAcC,EAAe9pB,EAAK+pB,EAAmBC,EAAqBpC,GAChHpL,EAAauC,EAAaC,IAC1BxC,EAAasN,EAAejC,IAC5B,IAAI3K,EAAO4M,EAAcjL,qBACrB2C,EAAOrH,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACX,IAAI6O,EAAO,EACN3N,EAAW4P,KACZvN,EAAauN,EAAmBnJ,IAChCkH,EAAOiC,EAAkBlL,sBAE7B,IAAImJ,EAAO,EACN7N,EAAW6P,KACZxN,EAAawN,EAAqBhN,IAClCgL,EAAOgC,EAAoBnL,sBAE/B,IAAIoJ,EAAO,EACN9N,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BF,EAAOL,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAKuS,qCAAqClL,EAAYzB,UAAWuM,EAAc3M,EAAMsE,EAAMwC,EAAM8D,EAAME,EAAMC,GAEjI,CAgCI,+BAAOlU,CAAyBgL,EAAamL,EAAgBjW,EAAWkW,EAAeL,EAAetC,EAAaC,EAAYznB,EAAKoqB,EAAsBC,EAAwB3C,EAAiBC,EAAmBC,GAClNpL,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB1F,EAAWyD,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACPuI,EAAO7H,EAAkBwQ,EAAezS,EAAKyF,kBAAmBzF,EAAK0F,oBACrE4G,EAAO/K,EACb,IAAI6O,EAAO,EACN3N,EAAW2P,KACZtN,EAAasN,EAAejC,IAC5BC,EAAOgC,EAAcjL,sBAEzB,IAAImJ,EAAO,EACN7N,EAAWsN,KACZjL,EAAaiL,EAAYI,IACzBG,EAAOP,EAAW5I,sBAEtB,IAAIoJ,EAAO9N,EAAWna,GAAO,EAAI2Z,EAAkB3Z,EAAK0X,EAAKyF,kBAAmBzF,EAAK0F,oBACjFyL,EAAO5P,EACX,IAAIiP,EAAO,EACN/N,EAAWiQ,KACZ5N,EAAa4N,EAAsBxJ,IACnCsH,EAAOkC,EAAqBvL,sBAEhC,IAAImK,EAAO,EACN7O,EAAWkQ,KACZ7N,EAAa6N,EAAwBrN,IACrCgM,EAAOqB,EAAuBxL,sBAElC,IAAIoK,EAAO,EACN9O,EAAWuN,KACZlL,EAAakL,EAAiB9G,IAC9BqI,EAAOvB,EAAgB7I,sBAE3B,IAAIqK,EAAO,EACN/O,EAAWwN,KACZnL,EAAamL,EAAmB3K,IAChCkM,EAAOvB,EAAkB9I,sBAE7B,IAAIyL,EAAO,EACNnQ,EAAWyN,KACZpL,EAAaoL,EAAeO,IAC5BmC,EAAO1C,EAAc/I,sBAGzB,OAAO5G,EADKP,EAAK6S,wCAAwCxL,EAAYzB,UAAW4M,EAAgBhN,EAAMG,EAAMmE,EAAMwC,EAAM8D,EAAMN,EAAaQ,EAAMC,EAAMY,EAAMX,EAAMc,EAAMC,EAAMC,EAAMoB,GAE7L,CAeI,wBAAOxW,CAAkBiL,EAAa/b,EAAS6Q,EAAarB,EAAQzN,GAChEyX,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkB3W,EAAS0U,EAAKyF,kBAAmBzF,EAAK0F,oBAC/DC,EAAOpE,EACPuI,EAAO7H,EAAkB9F,EAAa6D,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EAEb,OAAOhB,EADKP,EAAK8S,iCAAiCzL,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,EAAMjL,EAAcvG,GAAS2H,EAAWpV,GAAW,EAAIgU,EAAchU,IAExK,GAGA,MAAM0lB,GAA0D,oBAAzBpP,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKgT,sBAAsB9R,IAAQ,YAIzE,MAAMpQ,EAEF,aAAOkW,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOnW,EAAWoW,WAGrC,OAFA5F,EAAIsE,UAAY1E,EAChB6R,GAAuBnP,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC7CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBmN,GAAuBlP,WAAW/d,MAC3Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKgT,sBAAsB9R,EACnC,CAWI5L,kBAAAA,GAEI,OAAe,IADH0K,EAAKiT,8BAA8BntB,KAAK8f,UAE5D,CAWIsN,qBAAAA,GAEI,OAAe,IADHlT,EAAKmT,iCAAiCrtB,KAAK8f,UAE/D,CAWIpQ,yBAAAA,GAEI,OAAe,IADHwK,EAAKoT,qCAAqCttB,KAAK8f,UAEnE,CAWIlQ,kBAAAA,GAEI,OAAe,IADHsK,EAAKqT,8BAA8BvtB,KAAK8f,UAE5D,CAWIhQ,iBAAAA,GAEI,OAAe,IADHoK,EAAKsT,6BAA6BxtB,KAAK8f,UAE3D,CAWI9P,iBAAAA,GAEI,OAAe,IADHkK,EAAKuT,6BAA6BztB,KAAK8f,UAE3D,CAWI5P,YAAAA,GAEI,OAAe,IADHgK,EAAKwT,wBAAwB1tB,KAAK8f,UAEtD,CAWI1P,yBAAAA,GAEI,OAAe,IADH8J,EAAKyT,qCAAqC3tB,KAAK8f,UAEnE,CAWIxP,aAAAA,GAEI,OAAe,IADH4J,EAAK0T,yBAAyB5tB,KAAK8f,UAEvD,CAWItP,uBAAAA,GAEI,OAAe,IADH0J,EAAK2T,mCAAmC7tB,KAAK8f,UAEjE,CAWIpP,+BAAAA,GAEI,OAAe,IADHwJ,EAAK4T,2CAA2C9tB,KAAK8f,UAEzE,CAWIlP,sBAAAA,GAEI,OAAe,IADHsJ,EAAK6T,kCAAkC/tB,KAAK8f,UAEhE,CAWIkO,8BAAAA,GAEI,OAAe,IADH9T,EAAK+T,0CAA0CjuB,KAAK8f,UAExE,CAWIhP,+BAAAA,GAEI,OAAe,IADHoJ,EAAKgU,2CAA2CluB,KAAK8f,UAEzE,CAWI9O,oBAAAA,GAEI,OAAe,IADHkJ,EAAKiU,gCAAgCnuB,KAAK8f,UAE9D,CAOIsO,QAAAA,GACI,IAAIrM,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKmU,oBAAoBhP,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsM,IAAAA,GACI,MAAM5T,EAAMR,EAAKqU,gBAAgBvuB,KAAK8f,WACtC,OAAO9U,EAAWkW,OAAOxG,EACjC,CASI,gBAAOzP,CAAUujB,GACb,IACI,MAAMnP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOP,EAAkBqP,EAAOtU,EAAKyF,mBACrCE,EAAOpE,EACbvB,EAAKuU,qBAAqBpP,EAAQK,EAAMG,GACxC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOhV,EAAWkW,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQI,iBAAOze,CAAW6tB,GACd,IACI,MAAMrP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBuS,EAAQxU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKyU,sBAAsBtP,EAAQK,EAAMG,GACzC,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOhV,EAAWkW,OAAOnB,EACrC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/U,OAAAA,GACI,IACI,MAAM8U,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0U,mBAAmBvP,EAAQrf,KAAK8f,WACrC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,IAAI4D,EAAKzO,EAAoBL,EAAIC,GAAI1E,QAErC,OADApB,EAAKgI,gBAAgBnC,EAAS,EAALC,EAAQ,GAC1B6O,CACnB,CAAU,QACE3U,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4U,oBAAoBzP,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM+M,GAAgE,oBAAzBlR,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK8U,4BAA4B5T,IAAQ,YAI/E,MAAMnZ,EAEF,aAAOif,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOlf,EAAiBmf,WAG3C,OAFA5F,EAAIsE,UAAY1E,EAChB2T,GAA6BjR,SAAStC,EAAKA,EAAIsE,UAAWtE,GACnDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBiP,GAA6BhR,WAAW/d,MACjCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK8U,4BAA4B5T,EACzC,CASI,iBAAOva,CAAW+E,GACd,IACI,MAAMyZ,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBvW,EAAQsU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAK+U,4BAA4B5P,EAAQK,EAAMG,GAC/C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO/d,EAAiBif,OAAOnB,EAC3C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKgV,0BAA0B7P,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIrgB,OAAAA,CAAQggB,GACJ,IACI,MAAMtC,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAa2C,EAAUC,IACvB1H,EAAKiV,yBAAyB9P,EAAQrf,KAAK8f,UAAW6B,EAAS7B,WAC/D,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOqK,GAAgBnJ,OAAOnB,EAC1C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASItd,OAAAA,CAAQ2f,GACJ3C,EAAa2C,EAAUC,IAEvB,OAAe,IADH1H,EAAKkV,yBAAyBpvB,KAAK8f,UAAW6B,EAAS7B,UAE3E,GAGA,MAAMuP,GAA+D,oBAAzBxR,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKoV,2BAA2BlU,IAAQ,YAI9E,MAAMvF,EAEF,aAAOqL,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOtL,EAAgBuL,WAG1C,OAFA5F,EAAIsE,UAAY1E,EAChBiU,GAA4BvR,SAAStC,EAAKA,EAAIsE,UAAWtE,GAClDA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBuP,GAA4BtR,WAAW/d,MAChCob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKoV,2BAA2BlU,EACxC,CAMIkL,UAAAA,CAAWkD,EAAYN,GACnB,IACI,MAAM7J,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBqN,EAAYtP,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EACbvB,EAAKqV,2BAA2BlQ,EAAQrf,KAAK8f,UAAWJ,EAAMG,EAAMmE,EAAMwC,GAC1E,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOwP,EAAMtO,OAAOnB,EAChC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI,iBAAOze,CAAW+E,GACd,IACI,MAAMyZ,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBvW,EAAQsU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKuV,2BAA2BpQ,EAAQK,EAAMG,GAC9C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOnK,EAAgBqL,OAAOnB,EAC1C,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwV,yBAAyBrQ,EAAQrf,KAAK8f,WAC3C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI3b,YAAAA,GACI,MAAMqU,EAAMR,EAAKyV,6BAA6B3vB,KAAK8f,WACnD,OAAOvb,OAAO2mB,QAAQ,GAAIxQ,EAClC,CAOI3U,KAAAA,GACI,IAAIgc,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0V,sBAAsBvQ,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI9b,kBAAAA,CAAmBqb,EAAaiI,EAAYN,GACxC,IAAI2G,EACAC,EACJ,IACI,MAAMzQ,EAASnF,EAAKoF,iCAAiC,IACrDN,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOvD,EAAkBqN,EAAYtP,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACPuI,EAAO7H,EAAkB+M,EAAahP,EAAKyF,kBAAmBzF,EAAK0F,oBACnE4G,EAAO/K,EACbvB,EAAK6V,mCAAmC1Q,EAAQrf,KAAK8f,UAAWyB,EAAYzB,UAAWJ,EAAMG,EAAMmE,EAAMwC,GACzG,IAAIzG,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GACpC2Q,EAAKlT,IAAkBuC,EAAS,EAAI,GACpCmL,EAAOzK,EACPwL,EAAOvL,EACX,GAAIgQ,EAEA,MADAxF,EAAO,EAAGe,EAAO,EACX9Q,EAAWwQ,GAIrB,OAFA4E,EAAcrF,EACdsF,EAAcvE,EACPpQ,EAAmBqP,EAAMe,EAC5C,CAAU,QACErR,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgB2N,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBpS,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKgW,qBAAqB9U,IAAQ,YAIxE,MAAM+U,EAEF,aAAOjP,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOgP,EAAU/O,WAGpC,OAFA5F,EAAIsE,UAAY1E,EAChB6U,GAAsBnS,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC5CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBmQ,GAAsBlS,WAAW/d,MAC1Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKgW,qBAAqB9U,EAClC,CAWI,WAAOlZ,CAAKqf,EAAapf,GACrB6c,EAAauC,EAAaC,IAC1B,MAAM9B,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EACPf,EAAMR,EAAKqN,gBAAgBhG,EAAYzB,UAAWJ,EAAMG,GAC9D,OAAOsQ,EAAUjP,OAAOxG,EAChC,CAWItY,MAAAA,CAAOd,EAASa,GACZ6c,EAAa1d,EAASgmB,GACtB,MAAM5H,EAAOP,EAAkBhd,EAAS+X,EAAKyF,mBACvCE,EAAOpE,EAEb,OAAe,IADHvB,EAAKkW,iBAAiBpwB,KAAK8f,UAAWxe,EAAQwe,UAAWJ,EAAMG,EAEnF,CASI,kBAAOze,CAAYiB,GACf,MAAMqd,EAAOvD,EAAkB9Z,EAAW6X,EAAKyF,kBAAmBzF,EAAK0F,oBACjEC,EAAOpE,EACPf,EAAMR,EAAKmW,sBAAsB3Q,EAAMG,GAC7C,OAAOsQ,EAAUjP,OAAOxG,EAChC,CAOIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKoW,oBAAoBjR,EAAQrf,KAAK8f,WACtC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMuO,GAA2D,oBAAzB1S,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKsW,uBAAuBpV,IAAQ,YAO1E,MAAMzS,EAEF,aAAOuY,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOxY,EAAYyY,WAGtC,OAFA5F,EAAIsE,UAAY1E,EAChBmV,GAAwBzS,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC9CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjByQ,GAAwBxS,WAAW/d,MAC5Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKsW,uBAAuBpV,EACpC,CASI,iBAAOva,CAAWsE,GACd,IACI,MAAMka,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBhX,EAAa+U,EAAKyF,kBAAmBzF,EAAK0F,oBACnEC,EAAOpE,EACbvB,EAAKuW,uBAAuBpR,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAOrX,EAAYuY,OAAOnB,EACtC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAQI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKwW,qBAAqBrR,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI2O,aAAAA,GACI,IAAI5O,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK0W,0BAA0BvR,EAAQrf,KAAK8f,WAC5C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI6O,eAAAA,GACI,IAAI9O,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK4W,4BAA4BzR,EAAQrf,KAAK8f,WAC9C,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM+O,GAA4D,oBAAzBlT,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAK8W,wBAAwB5V,IAAQ,YAI3E,MAAMlQ,EAEF,aAAOgW,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAOjW,EAAakW,WAGvC,OAFA5F,EAAIsE,UAAY1E,EAChB2V,GAAyBjT,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC/CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjBiR,GAAyBhT,WAAW/d,MAC7Bob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAK8W,wBAAwB5V,EACrC,CAOI,yBAAOjK,GACH,MAAMuJ,EAAMR,EAAK+W,kCACjB,OAAO/lB,EAAagW,OAAOxG,EACnC,CAOI,4BAAOwW,GACH,MAAMxW,EAAMR,EAAKiX,qCACjB,OAAOjmB,EAAagW,OAAOxG,EACnC,CAOI,gCAAOrJ,GACH,MAAMqJ,EAAMR,EAAKkX,yCACjB,OAAOlmB,EAAagW,OAAOxG,EACnC,CAOI,yBAAOnJ,GACH,MAAMmJ,EAAMR,EAAKmX,kCACjB,OAAOnmB,EAAagW,OAAOxG,EACnC,CAOI,wBAAOjJ,GACH,MAAMiJ,EAAMR,EAAKoX,iCACjB,OAAOpmB,EAAagW,OAAOxG,EACnC,CAOI,wBAAO6W,GACH,MAAM7W,EAAMR,EAAKsX,iCACjB,OAAOtmB,EAAagW,OAAOxG,EACnC,CAOI,mBAAO/I,GACH,MAAM+I,EAAMR,EAAKuX,4BACjB,OAAOvmB,EAAagW,OAAOxG,EACnC,CAOI,gCAAO7I,GACH,MAAM6I,EAAMR,EAAKwX,yCACjB,OAAOxmB,EAAagW,OAAOxG,EACnC,CAOI,oBAAO3I,GACH,MAAM2I,EAAMR,EAAKyX,6BACjB,OAAOzmB,EAAagW,OAAOxG,EACnC,CAOI,8BAAOzI,GACH,MAAMyI,EAAMR,EAAK0X,uCACjB,OAAO1mB,EAAagW,OAAOxG,EACnC,CAOI,sCAAOvI,GACH,MAAMuI,EAAMR,EAAK2X,+CACjB,OAAO3mB,EAAagW,OAAOxG,EACnC,CAOI,6BAAOrI,GACH,MAAMqI,EAAMR,EAAK4X,sCACjB,OAAO5mB,EAAagW,OAAOxG,EACnC,CAOI,qCAAOqX,GACH,MAAMrX,EAAMR,EAAK8X,8CACjB,OAAO9mB,EAAagW,OAAOxG,EACnC,CAOI,sCAAOnI,GACH,MAAMmI,EAAMR,EAAK+X,+CACjB,OAAO/mB,EAAagW,OAAOxG,EACnC,CAOI,2BAAOjI,GACH,MAAMiI,EAAMR,EAAKgY,oCACjB,OAAOhnB,EAAagW,OAAOxG,EACnC,CAOIjL,oBAAAA,GAEI,OAAe,IADHyK,EAAKiY,kCAAkCnyB,KAAK8f,UAEhE,CAOIsS,uBAAAA,GAEI,OAAe,IADHlY,EAAKmY,qCAAqCryB,KAAK8f,UAEnE,CAOInQ,2BAAAA,GAEI,OAAe,IADHuK,EAAKoY,yCAAyCtyB,KAAK8f,UAEvE,CAOIjQ,oBAAAA,GAEI,OAAe,IADHqK,EAAKqY,kCAAkCvyB,KAAK8f,UAEhE,CAOI/P,mBAAAA,GAEI,OAAe,IADHmK,EAAKsY,iCAAiCxyB,KAAK8f,UAE/D,CAOI7P,mBAAAA,GAEI,OAAe,IADHiK,EAAKuY,iCAAiCzyB,KAAK8f,UAE/D,CAOI3P,cAAAA,GAEI,OAAe,IADH+J,EAAKwY,4BAA4B1yB,KAAK8f,UAE1D,CAOIzP,2BAAAA,GAEI,OAAe,IADH6J,EAAKyY,yCAAyC3yB,KAAK8f,UAEvE,CAOIvP,eAAAA,GAEI,OAAe,IADH2J,EAAK0Y,6BAA6B5yB,KAAK8f,UAE3D,CAOIrP,yBAAAA,GAEI,OAAe,IADHyJ,EAAK2Y,uCAAuC7yB,KAAK8f,UAErE,CAOInP,iCAAAA,GAEI,OAAe,IADHuJ,EAAK4Y,+CAA+C9yB,KAAK8f,UAE7E,CAOIjP,wBAAAA,GAEI,OAAe,IADHqJ,EAAK6Y,sCAAsC/yB,KAAK8f,UAEpE,CAOIkT,gCAAAA,GAEI,OAAe,IADH9Y,EAAK+Y,8CAA8CjzB,KAAK8f,UAE5E,CAOI/O,iCAAAA,GAEI,OAAe,IADHmJ,EAAKgZ,+CAA+ClzB,KAAK8f,UAE7E,CAOI7O,sBAAAA,GAEI,OAAe,IADHiJ,EAAKiZ,oCAAoCnzB,KAAK8f,UAElE,CAOIsO,QAAAA,GACI,IAAIrM,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKkZ,sBAAsB/T,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsM,IAAAA,GACI,MAAM5T,EAAMR,EAAKmZ,kBAAkBrzB,KAAK8f,WACxC,OAAO5U,EAAagW,OAAOxG,EACnC,CASI,gBAAOzP,CAAUujB,GACb,IACI,MAAMnP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOP,EAAkBqP,EAAOtU,EAAKyF,mBACrCE,EAAOpE,EACbvB,EAAKoZ,uBAAuBjU,EAAQK,EAAMG,GAC1C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO9U,EAAagW,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CASI,iBAAOze,CAAW6tB,GACd,IACI,MAAMrP,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBuS,EAAQxU,EAAKyF,kBAAmBzF,EAAK0F,oBAC9DC,EAAOpE,EACbvB,EAAKqZ,wBAAwBlU,EAAQK,EAAMG,GAC3C,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWuF,GAErB,OAAO9U,EAAagW,OAAOnB,EACvC,CAAU,QACE7F,EAAKoF,gCAAgC,GACjD,CACA,CAOI/U,OAAAA,GACI,IACI,MAAM8U,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKsZ,qBAAqBnU,EAAQrf,KAAK8f,WACvC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GAExC,GADSvC,IAAkBuC,EAAS,EAAI,GAEpC,MAAM5E,EAAWwQ,GAErB,IAAI4D,EAAKzO,EAAoBL,EAAIC,GAAI1E,QAErC,OADApB,EAAKgI,gBAAgBnC,EAAS,EAALC,EAAQ,GAC1B6O,CACnB,CAAU,QACE3U,EAAKoF,gCAAgC,GACjD,CACA,CAOI/d,QAAAA,GACI,IAAIwgB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAKuZ,sBAAsBpU,EAAQrf,KAAK8f,WACxC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0R,GAAuD,oBAAzB7V,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBzC,GAAOlB,EAAKyZ,mBAAmBvY,IAAQ,YAGtE,MAAM9a,EAEF,aAAO4gB,CAAO9F,GACVA,KAAc,EACd,MAAMI,EAAM3S,OAAOsY,OAAO7gB,EAAQ8gB,WAGlC,OAFA5F,EAAIsE,UAAY1E,EAChBsY,GAAoB5V,SAAStC,EAAKA,EAAIsE,UAAWtE,GAC1CA,CACf,CAEI6F,kBAAAA,GACI,MAAMjG,EAAMpb,KAAK8f,UAGjB,OAFA9f,KAAK8f,UAAY,EACjB4T,GAAoB3V,WAAW/d,MACxBob,CACf,CAEIkG,IAAAA,GACI,MAAMlG,EAAMpb,KAAKqhB,qBACjBnH,EAAKyZ,mBAAmBvY,EAChC,CASI,uBAAO7a,CAAiBghB,GACpBvC,EAAauC,EAAaC,IAC1B,MAAM9G,EAAMR,EAAKiN,uBAAuB5F,EAAYzB,WACpD,OAAOxf,EAAQ4gB,OAAOxG,EAC9B,CASI,kBAAOtZ,CAAYugB,GACf,MAAMjC,EAAOvD,EAAkBwF,EAAUzH,EAAKyF,kBAAmBzF,EAAK0F,oBAChEC,EAAOpE,EACPf,EAAMR,EAAK0Z,oBAAoBlU,EAAMG,GAC3C,OAAOvf,EAAQ4gB,OAAOxG,EAC9B,CAOIzZ,SAAAA,GACI,IAAI8gB,EACAC,EACJ,IACI,MAAM3C,EAASnF,EAAKoF,iCAAiC,IACrDpF,EAAK2Z,kBAAkBxU,EAAQrf,KAAK8f,WACpC,IAAIC,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GAGxC,OAFA0C,EAAchC,EACdiC,EAAchC,EACP7E,EAAmB4E,EAAIC,EAC1C,CAAU,QACE9F,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIoF,UAAAA,GACI,MAAM1M,EAAMR,EAAK2H,sBAAsB7hB,KAAK8f,WAC5C,OAAOwH,EAAQpG,OAAOxG,EAC9B,CASI/Y,OAAAA,CAAQjB,GACJ,IAAIozB,EACAC,EACJ,IACI,MAAM1U,EAASnF,EAAKoF,iCAAiC,IAC/CI,EAAOvD,EAAkBzb,EAAYwZ,EAAKyF,kBAAmBzF,EAAK0F,oBAClEC,EAAOpE,EACbvB,EAAK8Z,gBAAgB3U,EAAQrf,KAAK8f,UAAWJ,EAAMG,GACnD,IAAIE,EAAKjD,IAAkBuC,EAAS,EAAI,GACpCW,EAAKlD,IAAkBuC,EAAS,EAAI,GACpC4L,EAAKnO,IAAkBuC,EAAS,EAAI,GACpC2Q,EAAKlT,IAAkBuC,EAAS,EAAI,GACpCiL,EAAOvK,EACPwK,EAAOvK,EACX,GAAIgQ,EAEA,MADA1F,EAAO,EAAGC,EAAO,EACX9P,EAAWwQ,GAIrB,OAFA6I,EAAcxJ,EACdyJ,EAAcxJ,EACPpP,EAAmBmP,EAAMC,EAC5C,CAAU,QACErQ,EAAKoF,gCAAgC,IACrCpF,EAAKgI,gBAAgB4R,EAAaC,EAAa,EAC3D,CACA,GAGAzxB,eAAe2xB,EAAWxa,EAAQlS,GAC9B,GAAwB,mBAAb2sB,UAA2Bza,aAAkBya,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB3a,EAAQlS,EAEtE,CAAc,MAAOrH,GACL,GAA0C,oBAAtCuZ,EAAOvW,QAAQX,IAAI,gBAInB,MAAMrC,EAHNC,QAAQoG,KAAK,oMAAqMrG,EAKtO,CAGQ,MAAMsuB,QAAc/U,EAAO/P,cAC3B,aAAayqB,YAAYE,YAAY7F,EAAOjnB,EAEpD,CAAW,CACH,MAAM0X,QAAiBkV,YAAYE,YAAY5a,EAAQlS,GAEvD,OAAI0X,aAAoBkV,YAAYG,SACzB,CAAErV,WAAUxF,UAGZwF,CAEnB,CACA,CAEA,SAASsV,IACL,MAAMhtB,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQitB,IAAIC,2BAA6B,SAASnW,GAC9C7D,EAAW6D,EACnB,EACI/W,EAAQitB,IAAIE,2BAA6B,WAAa,OAAOhU,GAAY,WAErE,OAAOnF,EADK,IAAIoZ,eAExB,GAAOC,UAAU,EACbrtB,EAAQitB,IAAIK,wCAA0C,WAAa,OAAOnU,GAAY,SAAUpC,EAAMC,EAAMO,GACxGzE,EAAUiE,GAAMwW,iBAAiB3Z,EAAmBoD,EAAMO,GAClE,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIO,4BAA8B,WAAa,OAAOrU,GAAY,SAAUpC,EAAMC,EAAMO,EAAMgC,EAAMkU,EAAMC,GAC9G5a,EAAUiE,GAAM4W,KAAK/Z,EAAmBoD,EAAMO,GAAO3D,EAAmB2F,EAAMkU,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACbrtB,EAAQitB,IAAIW,4BAA8B,WAAa,OAAOzU,GAAY,SAAUpC,GAChFjE,EAAUiE,GAAM8W,MACxB,GAAOR,UAAU,EACbrtB,EAAQitB,IAAIa,gCAAkC,WAAa,OAAO3U,GAAY,SAAUpC,GAEpF,OAAO/C,EADKlB,EAAUiE,GAAM5b,SAEpC,GAAOkyB,UAAU,EACbrtB,EAAQitB,IAAIc,8BAAgC,WAAa,OAAO5U,GAAY,SAAUpC,GAElF,OADYjE,EAAUiE,GAAMzb,MAEpC,GAAO+xB,UAAU,EACbrtB,EAAQitB,IAAIe,2BAA6B,WAErC,OAAOha,EADK,IAAI1S,OAExB,EACItB,EAAQitB,IAAIgB,sBAAwB,SAASlX,EAAMC,GAE/C,OAAOhD,EADKJ,EAAmBmD,EAAMC,GAE7C,EACIhX,EAAQitB,IAAIiB,2BAA6B,WAAa,OAAO/U,GAAY,SAAUpC,EAAMC,EAAMO,GAE3F,OADY4W,QAAQprB,IAAI+P,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,GAE5E,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAImB,2BAA6B,WAAa,OAAOjV,GAAY,WAErE,OAAOnF,EADK,IAAIqa,QAExB,GAAOhB,UAAU,EACbrtB,EAAQitB,IAAIqB,4BAA8B,SAASvX,GAE/C,OAAO/C,EADKlB,EAAUiE,GAE9B,EACI/W,EAAQitB,IAAIsB,2BAA6B,WAAa,OAAOpV,GAAY,WAErE,OAAOnF,EADK,IAAIwa,gBAExB,GAAOnB,UAAU,EACbrtB,EAAQitB,IAAIwB,8BAAgC,SAAS1X,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAM2X,OAEpC,EACI1uB,EAAQitB,IAAI0B,8BAAgC,WAAa,OAAOxV,GAAY,SAAUpC,EAAMC,EAAMO,EAAMgC,EAAMkU,GAC1G3a,EAAUiE,GAAM6X,OAAOhb,EAAmBoD,EAAMO,GAAO3D,EAAmB2F,EAAMkU,GACxF,GAAOJ,UAAU,EACbrtB,EAAQitB,IAAI4B,2CAA6C,SAAS9X,GAC9D,IAAI+X,EACJ,IACIA,EAAShc,EAAUiE,aAAiB4V,QAChD,CAAU,MAAOxW,GACL2Y,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI9uB,EAAQitB,IAAI8B,8BAAgC,SAAShY,GAEjD,OADYjE,EAAUiE,GAAMzb,MAEpC,EACI0E,EAAQitB,IAAI+B,2BAA6B,SAASjY,EAAMC,GACpD,MACMyF,EAAO7H,EADD9B,EAAUkE,GAAM/b,IACQ0X,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIgC,+BAAiC,SAASlY,GAElD,OAAO/C,EADKlB,EAAUiE,GAAMpb,QAEpC,EACIqE,EAAQitB,IAAIiC,gCAAkC,WAE1C,OAAOlb,EADKmb,OAAOC,SAE3B,EACIpvB,EAAQitB,IAAIoC,2BAA6B,WAAa,OAAOlW,GAAY,SAAUpC,EAAMC,GAErF,OAAOhD,EADKma,QAAQnzB,IAAI8X,EAAUiE,GAAOjE,EAAUkE,IAE3D,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIqC,uBAAyB,SAASvY,GAE1C,MADwC,mBAArBjE,EAAUiE,EAErC,EACI/W,EAAQitB,IAAIsC,4BAA8B,WAAa,OAAOpW,GAAY,SAAUpC,EAAMC,GAEtF,OAAOhD,EADKlB,EAAUiE,GAAMhB,KAAKjD,EAAUkE,IAEnD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIuC,qBAAuB,SAASzY,GACxC,MAAMrB,EAAM5C,EAAUiE,GAEtB,MAD4B,iBAATrB,GAA6B,OAARA,CAEhD,EACI1V,EAAQitB,IAAIwC,4BAA8B,SAAS1Y,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAM2Y,KAEpC,EACI1vB,EAAQitB,IAAI0C,4BAA8B,WAAa,OAAOxW,GAAY,SAAUpC,GAEhF,OAAO/C,EADKlB,EAAUiE,GAAM2Y,OAEpC,GAAOrC,UAAU,EACbrtB,EAAQitB,IAAI2C,4BAA8B,SAAS7Y,GAE/C,OADYjE,EAAUiE,GAAM8Y,IAEpC,EACI7vB,EAAQitB,IAAI6C,6BAA+B,SAAS/Y,GAEhD,OAAO/C,EADKlB,EAAUiE,GAAMzY,MAEpC,EACI0B,EAAQitB,IAAI8C,6BAA+B,SAAShZ,GAChDjE,EAAUiE,GAAMiZ,OACxB,EACIhwB,EAAQitB,IAAIgD,iCAAmC,WAAa,OAAO9W,GAAY,SAAUpC,GAErF,OAAO/C,EADKiC,KAAKC,UAAUpD,EAAUiE,IAE7C,GAAOsW,UAAU,EACbrtB,EAAQitB,IAAIiD,sBAAwB,SAASnZ,EAAMC,GAC/C,MAAM/C,EAAMnB,EAAUkE,GAChB7D,EAAsB,iBAATc,EAAoBA,OAAMjM,EAC7C,IAAIyU,EAAOrH,EAAWjC,GAAO,EAAIyB,EAAkBzB,EAAKR,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACXqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIkD,2BAA6B,SAASpZ,EAAMC,GACpDpe,QAAQiU,IAAI+G,EAAmBmD,EAAMC,GAC7C,EACIhX,EAAQitB,IAAImD,2BAA6B,SAASrZ,GAE9C,OAAO/C,EADKhX,OAAO2mB,QAAQ,GAAI5M,GAEvC,EACI/W,EAAQitB,IAAIoD,4BAA8B,WAAa,OAAOlX,GAAY,SAAUpC,EAAMC,EAAMO,GAE5F,OAAOvD,EADKlB,EAAUiE,GAAMhB,KAAKjD,EAAUkE,GAAOlE,EAAUyE,IAEpE,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIqD,sBAAwB,SAASvZ,GAEzC,OAAO/C,EADKuc,GAAY5W,OAAO5C,GAEvC,EACI/W,EAAQitB,IAAIuD,kBAAoB,SAASzZ,GAErC,OAAO/C,EADK0H,GAAQ/B,OAAO5C,GAEnC,EACI/W,EAAQitB,IAAIwD,kBAAoB,WAE5B,OAAOzc,EADK0c,EAAWC,uBAE/B,EACI3wB,EAAQitB,IAAI2D,kBAAoB,WAE5B,OAAO5c,EADKrB,EAAKR,OAEzB,EACInS,EAAQitB,IAAI4D,mCAAqC,SAAS9Z,EAAMC,EAAMO,EAAMgC,GAExE,OAAOvF,EADK/B,EAAYa,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,GAAOgC,IAAS,GAE5F,EACIvZ,EAAQitB,IAAI6D,4BAA8B,SAAS/Z,GAE/C,OAAO/C,EADK+c,EAAkBpX,OAAO5C,GAE7C,EACI/W,EAAQitB,IAAI+D,qCAAuC,SAASja,GAExD,OAAO/C,EADK,IAAIvX,MAAMsa,IAAS,GAEvC,EACI/W,EAAQitB,IAAIgE,2BAA6B,SAASla,EAAMC,EAAMO,GAC1DzE,EAAUiE,GAAMC,IAAS,GAAK9D,EAAWqE,EACjD,EACIvX,EAAQitB,IAAIiE,mBAAqB,SAASna,GACtC,MAAM9C,EAAMf,EAAW6D,GAAMM,SAC7B,GAAiB,GAAbpD,EAAIiD,MAEJ,OADAjD,EAAI2C,EAAI,GACD,EAGX,OADY,CAEpB,EACI5W,EAAQitB,IAAIkE,2BAA6B,WAErC,OAAOnd,EADK,IAAIvX,MAExB,EACIuD,EAAQitB,IAAImE,4BAA8B,SAASra,EAAMC,GAErD,OADYlE,EAAUiE,GAAMlY,KAAKiU,EAAUkE,GAEnD,EACIhX,EAAQitB,IAAIoE,mCAAqC,WAAa,OAAOlY,GAAY,SAAUpC,GAEvF,OAAO/C,EADKlB,EAAUiE,GAAM5U,cAEpC,GAAOkrB,UAAU,EACbrtB,EAAQitB,IAAIqE,2BAA6B,SAASva,GAE9C,OAAO/C,EADK,IAAI5R,WAAW0Q,EAAUiE,IAE7C,EACI/W,EAAQitB,IAAIsE,8BAAgC,SAASxa,GAEjD,OADYjE,EAAUiE,GAAMxZ,MAEpC,EACIyC,EAAQitB,IAAIuE,2BAA6B,SAASza,EAAMC,GACpD,IACI,IAAIya,EAAS,CAAC7a,EAAGG,EAAMF,EAAGG,GAU1B,MAAM7D,EAAM,IAAItL,SATN6pB,CAAC3a,EAAMC,KACb,MAAMJ,EAAI6a,EAAO7a,EACjB6a,EAAO7a,EAAI,EACX,IACI,OAAO0C,EAAkB1C,EAAG6a,EAAO5a,EAAGE,EAAMC,EAChE,CAAkB,QACEya,EAAO7a,EAAIA,CAC/B,KAGY,OAAO5C,EAAcb,EACjC,CAAU,QACEse,EAAO7a,EAAI6a,EAAO5a,EAAI,CAClC,CACA,EACI7W,EAAQitB,IAAI0E,sBAAwB,SAAS5a,GAEzC,OAAO/C,EADK+C,EAEpB,EACI/W,EAAQitB,IAAI2E,2BAA6B,WAErC,OAAO5d,EADK,IAAIlb,MAExB,EACIkH,EAAQitB,IAAI4E,6BAA+B,SAAS9a,EAAMC,GACtD,MACMyF,EAAO7H,EADD9B,EAAUkE,GAAMZ,MACQzD,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAI6E,6BAA+B,SAAS/a,EAAMC,GACtD,IAAI+a,EACAC,EACJ,IACID,EAAchb,EACdib,EAAchb,EACdpe,QAAQC,MAAM+a,EAAmBmD,EAAMC,GACnD,CAAU,QACErE,EAAKgI,gBAAgBoX,EAAaC,EAAa,EAC3D,CACA,EACIhyB,EAAQitB,IAAIgF,8BAAgC,SAASlb,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAMpD,OAEpC,EACI3T,EAAQitB,IAAIiF,kDAAoD,SAASnb,EAAMC,EAAMO,GAEjF,OAAOvD,EADK,IAAI5R,WAAW0Q,EAAUiE,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACIvX,EAAQitB,IAAIkF,sCAAwC,WAAa,OAAOhZ,GAAY,SAAUpC,EAAMC,GAChGlE,EAAUiE,GAAMqb,eAAelf,EAAW8D,GAClD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIoF,gCAAkC,SAAStb,EAAMC,EAAMO,GAE/D,OAAOvD,EADKlB,EAAUiE,GAAMhC,SAASiC,IAAS,EAAGO,IAAS,GAElE,EACIvX,EAAQitB,IAAIqF,uCAAyC,WAAa,OAAOnZ,GAAY,SAAUpC,EAAMC,GACjGlE,EAAUiE,GAAMwb,gBAAgBzf,EAAUkE,GAClD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIuF,2BAA6B,SAASzb,EAAMC,EAAMO,GAC1DzE,EAAUiE,GAAMhU,IAAI+P,EAAUkE,GAAOO,IAAS,EACtD,EACIvX,EAAQitB,IAAIwF,8BAAgC,SAAS1b,GAEjD,OAAO/C,EADKlB,EAAUiE,GAAM2b,OAEpC,EACI1yB,EAAQitB,IAAI0F,+BAAiC,SAAS5b,GAElD,OAAO/C,EADKlB,EAAUiE,GAAM6b,QAEpC,EACI5yB,EAAQitB,IAAI4F,gCAAkC,SAAS9b,GAEnD,OAAO/C,EADKlB,EAAUiE,GAAM+b,SAEpC,EACI9yB,EAAQitB,IAAI8F,4BAA8B,SAAShc,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAMic,KAEpC,EACIhzB,EAAQitB,IAAIgG,qBAAuB,SAASlc,GAExC,MADwC,iBAArBjE,EAAUiE,EAErC,EACI/W,EAAQitB,IAAIiG,+BAAiC,WAAa,OAAO/Z,GAAY,WAEzE,OAAOnF,EADK9B,OAAOihB,QAE3B,GAAO9F,UAAU,EACbrtB,EAAQitB,IAAImG,gCAAkC,SAASrc,GAEnD,OAAO/C,EADKlB,EAAUiE,GAAMsc,SAEpC,EACIrzB,EAAQitB,IAAIqG,qCAAuC,SAASvc,GAExD,OAAO/C,EADK,IAAI5R,WAAW2U,IAAS,GAE5C,EACI/W,EAAQitB,IAAIsG,8BAAgC,SAASxc,GAEjD,OADYjE,EAAUiE,GAAMxZ,MAEpC,EACIyC,EAAQitB,IAAIuG,2BAA6B,SAASzc,EAAMC,GAEpD,OAAOhD,EADKlB,EAAUiE,GAAMC,IAAS,GAE7C,EACIhX,EAAQitB,IAAIwG,4BAA8B,WAAa,OAAOta,GAAY,WAEtE,OAAOnF,EADK0f,KAAKA,KAEzB,GAAOrG,UAAU,EACbrtB,EAAQitB,IAAI0G,8BAAgC,WAAa,OAAOxa,GAAY,WAExE,OAAOnF,EADK4f,OAAOA,OAE3B,GAAOvG,UAAU,EACbrtB,EAAQitB,IAAI4G,kCAAoC,WAAa,OAAO1a,GAAY,WAE5E,OAAOnF,EADK8f,WAAWA,WAE/B,GAAOzG,UAAU,EACbrtB,EAAQitB,IAAI8G,8BAAgC,WAAa,OAAO5a,GAAY,WAExE,OAAOnF,EADKggB,OAAOA,OAE3B,GAAO3G,UAAU,EACbrtB,EAAQitB,IAAIgH,wBAA0B,SAASld,GAE3C,YADgC/O,IAApB8K,EAAUiE,EAE9B,EACI/W,EAAQitB,IAAIiH,iCAAmC,SAASnd,EAAMC,GAE1D,OAAOhD,EADK,IAAImgB,SAASvgB,EAAmBmD,EAAMC,IAE1D,EACIhX,EAAQitB,IAAImH,2BAA6B,WAAa,OAAOjb,GAAY,SAAUpC,EAAMC,GAErF,OADYmX,QAAQjrB,IAAI4P,EAAUiE,GAAOjE,EAAUkE,GAE3D,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAIoH,6BAA+B,SAAStd,GAEhD,OAAO/C,EADK5Y,MAAM0X,EAAUiE,IAEpC,EACI/W,EAAQitB,IAAIqH,6BAA+B,SAASvd,EAAMC,GAEtD,OAAOhD,EADKlB,EAAUiE,GAAM3b,MAAM0X,EAAUkE,IAEpD,EACIhX,EAAQitB,IAAIsH,wBAA0B,SAASxd,EAAMC,GACjD,MACMyF,EAAO7H,EADDa,EAAY3C,EAAUkE,IACErE,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIuH,iBAAmB,SAASzd,EAAMC,GAC1C,MAAM,IAAIle,MAAM8a,EAAmBmD,EAAMC,GACjD,EACIhX,EAAQitB,IAAIwH,mBAAqB,SAAS1d,GACtC,MAAM7D,EAAW6D,EACzB,EACI/W,EAAQitB,IAAIyH,4BAA8B,SAAS3d,EAAMC,EAAMO,GAE3D,OAAOvD,EADKlB,EAAUiE,GAAM4d,KAAK7hB,EAAUkE,GAAOlE,EAAUyE,IAEpE,EACIvX,EAAQitB,IAAI2H,4BAA8B,SAAS7d,EAAMC,GAErD,OAAOhD,EADKlB,EAAUiE,GAAM4d,KAAK7hB,EAAUkE,IAEnD,EACIhX,EAAQitB,IAAI4H,sCAAwC,SAAS9d,GACzD+d,eAAehiB,EAAUiE,GACjC,EACI/W,EAAQitB,IAAI8H,sCAAwC,SAAShe,GAEzD,OAAO/C,EADKlB,EAAUiE,GAAM+d,eAEpC,EACI90B,EAAQitB,IAAI+H,+BAAiC,SAASje,GAElD,OAAO/C,EADKnM,QAAQC,QAAQgL,EAAUiE,IAE9C,EACI/W,EAAQitB,IAAIgI,iCAAmC,WAE3C,OAAOjhB,EADKkhB,QAAQC,UAE5B,EACIn1B,EAAQitB,IAAImI,2BAA6B,SAASre,GAE9C,OAAO/C,EADK,IAAIwB,WAAW1C,EAAUiE,IAE7C,EACI/W,EAAQitB,IAAIoI,iCAAmC,SAASte,EAAMC,EAAMO,GAEhE,OAAOvD,EADKkhB,QAAQC,UAAUriB,EAAUiE,GAAOC,EAAMO,GAE7D,EACIvX,EAAQitB,IAAIqI,6BAA+B,SAASve,GAEhD,OADYjE,EAAUiE,GAAMhc,KAEpC,EACIiF,EAAQitB,IAAIsI,6BAA+B,SAASxe,GAEhD,OAAO/C,EADKlB,EAAUiE,GAAMzY,MAEpC,EACI0B,EAAQitB,IAAIuI,iCAAmC,SAASze,GACpD,MAOM0F,EAAO7H,EAPD,+BAAiC6gB,mBAAoB,6OAO7B9iB,EAAKyF,kBAAmBzF,EAAK0F,oBAC3D4G,EAAO/K,EACbqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,EACIzc,EAAQitB,IAAIyI,2BAA6B,WAAa,OAAOvc,GAAY,SAAUpC,EAAMC,GAErF,OAAOhD,EADK,IAAIjI,OAAO6H,EAAmBmD,EAAMC,IAExD,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAI0I,oCAAsC,SAAS5e,EAAMC,GAC7DlE,EAAUiE,GAAM6e,UAAY9iB,EAAUkE,EAC9C,EACIhX,EAAQitB,IAAI4I,0BAA4B,SAAS9e,EAAMC,EAAMO,GAEzD,OAAOvD,EADKvX,MAAMq5B,GAAGhjB,EAAUiE,GAAOjE,EAAUkE,GAAOlE,EAAUyE,IAEzE,EACIvX,EAAQitB,IAAI8I,mCAAqC,WAAa,OAAO5c,GAAY,SAAUpC,EAAMC,GAC7FlE,EAAUiE,GAAMrE,YAAYI,EAAUkE,GAC9C,GAAOqW,UAAU,EACbrtB,EAAQitB,IAAI+I,4BAA8B,SAASjf,GAE/C,OAAO/C,EADKlB,EAAUiE,GAAM7U,KAEpC,EACIlC,EAAQitB,IAAIgJ,yCAA2C,WAAa,OAAO9c,GAAY,SAAUpC,EAAMC,EAAMO,GAEzG,OAAOvD,EADK,IAAIkiB,QAAQtiB,EAAmBmD,EAAMC,GAAOlE,EAAUyE,IAE1E,GAAO8V,UAAU,EACbrtB,EAAQitB,IAAIkJ,oCAAsC,WAAa,OAAOhd,GAAY,SAAUpC,EAAMC,GAC9F,MAAM7D,EAAML,EAAUkE,GAAMof,aAC5B,IAAI3Z,EAAOrH,EAAWjC,GAAO,EAAIyB,EAAkBzB,EAAKR,EAAKyF,kBAAmBzF,EAAK0F,oBACjF4G,EAAO/K,EACXqB,IAAkBwB,EAAO,EAAI,GAAKkI,EAClC1J,IAAkBwB,EAAO,EAAI,GAAK0F,CAC1C,GAAO4Q,UAAU,EACbrtB,EAAQitB,IAAIoJ,+BAAiC,SAAStf,EAAMC,EAAMO,GAE9D,OAAOvD,EADK8C,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACItX,EAAQitB,IAAIqJ,+BAAiC,SAASvf,EAAMC,EAAMO,GAE9D,OAAOvD,EADK8C,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWtX,CACX,CAEA,SAASu2B,EAAkBv2B,EAASw2B,GAChCx2B,EAAQitB,IAAI9a,OAASqkB,GAAgB,IAAI5J,YAAY6J,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoBnf,EAAUxF,GAQnC,OAPAS,EAAO+E,EAASof,QAChBpG,EAAWC,uBAAyBze,EACpCwG,EAAwB,KACxBpD,EAAqB,KACrB7B,EAAqB,KAErBd,EAAKokB,mBACEpkB,CACX,CAEA,SAASqkB,EAAS9kB,EAAQskB,GACtB,QAAaxuB,IAAT2K,EAAoB,OAAOA,EAE/B,MAAM3S,EAAUgtB,IAEhBuJ,EAAkBv2B,EAASw2B,GAErBtkB,aAAkB0a,YAAYqK,SAChC/kB,EAAS,IAAI0a,YAAYqK,OAAO/kB,IAKpC,OAAO2kB,EAFU,IAAIjK,YAAYG,SAAS7a,EAAQlS,GAEbkS,EACzC,CAEAnX,eAAe21B,EAAWwG,EAAOV,GAC7B,QAAaxuB,IAAT2K,EAAoB,OAAOA,EAG/B,MAAM3S,EAAUgtB,KAEK,iBAAVkK,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARlqB,KAAsBkrB,aAAiBlrB,OAC3IkrB,EAAQ97B,MAAM87B,IAGlBX,EAAkBv2B,EAASw2B,GAE3B,MAAM,SAAE9e,EAAQ,OAAExF,SAAiBwa,QAAiBwK,EAAOl3B,GAE3D,OAAO62B,EAAoBnf,EAAUxF,EACzC,CAEA,IAAI4kB,EAAuBx1B,OAAO61B,OAAO,CACrCC,UAAW,KACXn+B,QAAS8mB,EACT/E,UAAWhD,EACXqD,kBAAmB0V,EACnB5U,MAAO8L,EACPvM,QAASA,GACT/J,SAAU0lB,GACV1Y,aAAcyE,GACd7pB,WAAY0gB,GACZ5gB,qBAAsB+mB,GACtBhhB,QAAS8Y,GACThM,eAAgBkB,GAChB3J,WAAYoY,GACZnhB,iBAAkB48B,GAClBhpB,gBAAiBwU,GACjB8F,UAAWhO,GACXxZ,YAAamvB,GACb5sB,aAAcsU,GACdlf,QAASshB,GACTkd,QAAS7G,EACTsG,SAAUA,EACV9d,eAAgBF,EAChBF,eAAgBA,EAChBzH,wBAAyBwG,IAG7B,MAAM2f,GAAY,wBC57Ib,MACDte,eAAgBue,GAAkB,QAClCx+B,GAAO,UACP+hB,GAAS,kBACTK,GAAiB,MACjBc,GAAK,SACLxK,GAAQ,aACRgN,GAAY,QACZ+Y,GAAO,WACPn+B,GAAU,qBACVF,GAAoB,QACpB+F,GAAO,WACPqE,GAAU,iBACV/I,GAAgB,gBAChB4T,GAAe,eACfpC,GAAc,UACd0c,GAAS,YACTxnB,GAAW,QACXrI,GAAO,aACP4K,GAAY,wBACZ0N,SD26IoBtW,OAAO48B,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY/hB,KAAKiiB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAepH,EAAYqH,SAG3BrH,EAAWqH,GAGdjB,CAAO,EC97IpBkB,CAAK,CACXJ,WAAYA,IACD,IAAI5rB,IAAI,eAIvBjR,eAAeme,EAAe+e,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBv/B,QAAQw/B,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIzrB,IAAI,aAA+BisB,EACpE,6DChCA,MAAMI,EAAclJ,OAAO,iBACrBmJ,EAAiBnJ,OAAO,oBACxBoJ,EAAepJ,OAAO,wBACtBqJ,EAAYrJ,OAAO,qBACnBsJ,EAActJ,OAAO,kBACrBuJ,EAAYhjB,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEijB,EAAmB,IAAIr2B,IAAI,CAC7B,CAAC,QA7CwB,CACzBs2B,UAAYljB,GAAQgjB,EAAShjB,IAAQA,EAAI2iB,GACzC,SAAAQ,CAAU5kB,GACN,MAAM,MAAE6kB,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAC,EAAOhlB,EAAK6kB,GACL,CAACC,EAAO,CAACA,GACpB,EACAG,YAAYC,IACRA,EAAKz8B,QACEuP,EAAKktB,MAqChB,CAAC,QA/BwB,CACzBP,UAAYt6B,GAAUo6B,EAASp6B,IAAUm6B,KAAen6B,EACxD,SAAAu6B,EAAU,MAAEv6B,IACR,IAAI86B,EAcJ,OAZIA,EADA96B,aAAiBxF,MACJ,CACTugC,SAAS,EACT/6B,MAAO,CACH1D,QAAS0D,EAAM1D,QACf6G,KAAMnD,EAAMmD,KACZ2U,MAAO9X,EAAM8X,QAKR,CAAEijB,SAAS,EAAO/6B,SAE5B,CAAC86B,EAAY,GACxB,EACA,WAAAF,CAAYE,GACR,GAAIA,EAAWC,QACX,MAAM/3B,OAAOC,OAAO,IAAIzI,MAAMsgC,EAAW96B,MAAM1D,SAAUw+B,EAAW96B,OAExE,MAAM86B,EAAW96B,KACrB,MAoBJ,SAAS26B,EAAOhlB,EAAKqlB,EAAKxF,WAAYyF,EAAiB,CAAC,MACpDD,EAAGlnB,iBAAiB,WAAW,SAASonB,EAASC,GAC7C,IAAKA,IAAOA,EAAGv3B,KACX,OAEJ,IAhBR,SAAyBq3B,EAAgBG,GACrC,IAAK,MAAMC,KAAiBJ,EAAgB,CACxC,GAAIG,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBP,EAAgBE,EAAGC,QAEpC,YADA9gC,QAAQoG,KAAK,mBAAmBy6B,EAAGC,6BAGvC,MAAM,GAAE54B,EAAE,KAAEnD,EAAI,KAAEo8B,GAASz4B,OAAOC,OAAO,CAAEw4B,KAAM,IAAMN,EAAGv3B,MACpD83B,GAAgBP,EAAGv3B,KAAK83B,cAAgB,IAAIz/B,IAAI0/B,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASJ,EAAKhmB,MAAM,GAAI,GAAGqmB,QAAO,CAACnmB,EAAKomB,IAASpmB,EAAIomB,IAAOpmB,GAC5DqmB,EAAWP,EAAKK,QAAO,CAACnmB,EAAKomB,IAASpmB,EAAIomB,IAAOpmB,GACvD,OAAQtW,GACJ,IAAK,MAEGu8B,EAAcI,EAElB,MACJ,IAAK,MAEGH,EAAOJ,EAAKhmB,OAAO,GAAG,IAAMkmB,EAAcR,EAAGv3B,KAAK5D,OAClD47B,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcI,EAASlhB,MAAM+gB,EAAQH,GAEzC,MACJ,IAAK,YAGGE,EA6KxB,SAAejmB,GACX,OAAO3S,OAAOC,OAAO0S,EAAK,CAAE,CAACokB,IAAc,GAC/C,CA/KsCkC,CADA,IAAID,KAAYN,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAElB,EAAK,MAAEC,GAAU,IAAIC,eAC7BC,EAAOhlB,EAAK8kB,GACZmB,EAkKxB,SAAkBjmB,EAAKumB,GAEnB,OADAC,EAAc13B,IAAIkR,EAAKumB,GAChBvmB,CACX,CArKsCvE,CAASopB,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGoB,OAAclyB,EAElB,MACJ,QACI,OAEZ,CACA,MAAO1J,GACH47B,EAAc,CAAE57B,QAAO,CAACm6B,GAAc,EAC1C,CACA5wB,QAAQC,QAAQoyB,GACXQ,OAAOp8B,IACD,CAAEA,QAAO,CAACm6B,GAAc,MAE9B9D,MAAMuF,IACP,MAAOS,EAAWC,GAAiBC,EAAYX,GAC/CZ,EAAG5mB,YAAYpR,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGo5B,GAAY,CAAE75B,OAAO85B,GACvD,YAATj9B,IAEA27B,EAAGwB,oBAAoB,UAAWtB,GAClCuB,EAAczB,GACVd,KAAavkB,GAAiC,mBAAnBA,EAAIukB,IAC/BvkB,EAAIukB,KAEZ,IAECkC,OAAO7hC,IAER,MAAO8hC,EAAWC,GAAiBC,EAAY,CAC3Cv8B,MAAO,IAAI08B,UAAU,+BACrB,CAACvC,GAAc,IAEnBa,EAAG5mB,YAAYpR,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGo5B,GAAY,CAAE75B,OAAO85B,EAAc,GAE1F,IACItB,EAAG58B,OACH48B,EAAG58B,OAEX,CAIA,SAASq+B,EAAcE,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAAS1iC,YAAYkJ,IAChC,EAEQy5B,CAAcD,IACdA,EAASE,OACjB,CACA,SAASlvB,EAAKqtB,EAAI8B,GACd,OAAOC,EAAY/B,EAAI,GAAI8B,EAC/B,CACA,SAASE,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIziC,MAAM,6CAExB,CACA,SAAS0iC,EAAgBlC,GACrB,OAAOmC,EAAuBnC,EAAI,CAC9B37B,KAAM,YACPg3B,MAAK,KACJoG,EAAczB,EAAG,GAEzB,CACA,MAAMoC,EAAe,IAAIC,QACnBC,EAAkB,yBAA0B9H,YAC9C,IAAIxd,sBAAsBgjB,IACtB,MAAMuC,GAAYH,EAAa1gC,IAAIs+B,IAAO,GAAK,EAC/CoC,EAAa34B,IAAIu2B,EAAIuC,GACJ,IAAbA,GACAL,EAAgBlC,EACpB,IAcR,SAAS+B,EAAY/B,EAAIS,EAAO,GAAIqB,EAAS,WAAc,GACvD,IAAIU,GAAkB,EACtB,MAAMvB,EAAQ,IAAIwB,MAAMX,EAAQ,CAC5B,GAAApgC,CAAIghC,EAAS3B,GAET,GADAiB,EAAqBQ,GACjBzB,IAAS9B,EACT,MAAO,MAXvB,SAAyBgC,GACjBqB,GACAA,EAAgBplB,WAAW+jB,EAEnC,CAQoB0B,CAAgB1B,GAChBiB,EAAgBlC,GAChBwC,GAAkB,CAAI,EAG9B,GAAa,SAATzB,EAAiB,CACjB,GAAoB,IAAhBN,EAAKx8B,OACL,MAAO,CAAEo3B,KAAM,IAAM4F,GAEzB,MAAM2B,EAAIT,EAAuBnC,EAAI,CACjC37B,KAAM,MACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,eACzB26B,KAAKsF,GACR,OAAOiC,EAAEvH,KAAKyH,KAAKF,EACvB,CACA,OAAOb,EAAY/B,EAAI,IAAIS,EAAMM,GACrC,EACA,GAAAt3B,CAAIi5B,EAAS3B,EAAMC,GACfgB,EAAqBQ,GAGrB,MAAOx9B,EAAOs8B,GAAiBC,EAAYP,GAC3C,OAAOmB,EAAuBnC,EAAI,CAC9B37B,KAAM,MACNo8B,KAAM,IAAIA,EAAMM,GAAM9/B,KAAK4hC,GAAMA,EAAEniC,aACnCsE,SACDs8B,GAAejG,KAAKsF,EAC3B,EACA,KAAA7gB,CAAM4iB,EAASK,EAAUC,GACrBhB,EAAqBQ,GACrB,MAAMS,EAAOxC,EAAKA,EAAKx8B,OAAS,GAChC,GAAIg/B,IAASjE,EACT,OAAOmD,EAAuBnC,EAAI,CAC9B37B,KAAM,aACPg3B,KAAKsF,GAGZ,GAAa,SAATsC,EACA,OAAOlB,EAAY/B,EAAIS,EAAKhmB,MAAM,GAAI,IAE1C,MAAOimB,EAAcY,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBnC,EAAI,CAC9B37B,KAAM,QACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,aACxBggC,gBACDY,GAAejG,KAAKsF,EAC3B,EACA,SAAAwC,CAAUT,EAASM,GACfhB,EAAqBQ,GACrB,MAAO9B,EAAcY,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBnC,EAAI,CAC9B37B,KAAM,YACNo8B,KAAMA,EAAKx/B,KAAK4hC,GAAMA,EAAEniC,aACxBggC,gBACDY,GAAejG,KAAKsF,EAC3B,IAGJ,OA7EJ,SAAuBM,EAAOjB,GAC1B,MAAMuC,GAAYH,EAAa1gC,IAAIs+B,IAAO,GAAK,EAC/CoC,EAAa34B,IAAIu2B,EAAIuC,GACjBD,GACAA,EAAgBrlB,SAASgkB,EAAOjB,EAAIiB,EAE5C,CAsEImC,CAAcnC,EAAOjB,GACdiB,CACX,CAIA,SAASiC,EAAiBxC,GACtB,MAAM2C,EAAY3C,EAAaz/B,IAAIsgC,GACnC,MAAO,CAAC8B,EAAUpiC,KAAKqiC,GAAMA,EAAE,MALnBC,EAK+BF,EAAUpiC,KAAKqiC,GAAMA,EAAE,KAJ3DngC,MAAMod,UAAUijB,OAAO1jB,MAAM,GAAIyjB,KAD5C,IAAgBA,CAMhB,CACA,MAAMpC,EAAgB,IAAIkB,QAe1B,SAASd,EAAYv8B,GACjB,IAAK,MAAOmD,EAAMs7B,KAAYpE,EAC1B,GAAIoE,EAAQnE,UAAUt6B,GAAQ,CAC1B,MAAO0+B,EAAiBpC,GAAiBmC,EAAQlE,UAAUv6B,GAC3D,MAAO,CACH,CACIX,KAAM,UACN8D,OACAnD,MAAO0+B,GAEXpC,EAER,CAEJ,MAAO,CACH,CACIj9B,KAAM,MACNW,SAEJm8B,EAAcz/B,IAAIsD,IAAU,GAEpC,CACA,SAAS27B,EAAc37B,GACnB,OAAQA,EAAMX,MACV,IAAK,UACD,OAAOg7B,EAAiB39B,IAAIsD,EAAMmD,MAAMy3B,YAAY56B,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAASm9B,EAAuBnC,EAAI2D,EAAKzC,GACrC,OAAO,IAAI3yB,SAASC,IAChB,MAAMhH,EAeH,IAAIrE,MAAM,GACZoW,KAAK,GACLtY,KAAI,IAAMyV,KAAKktB,MAAMltB,KAAKmtB,SAAWC,OAAOC,kBAAkBrjC,SAAS,MACvE6L,KAAK,KAjBNyzB,EAAGlnB,iBAAiB,WAAW,SAASjU,EAAEs7B,GACjCA,EAAGv3B,MAASu3B,EAAGv3B,KAAKpB,IAAM24B,EAAGv3B,KAAKpB,KAAOA,IAG9Cw4B,EAAGwB,oBAAoB,UAAW38B,GAClC2J,EAAQ2xB,EAAGv3B,MACf,IACIo3B,EAAG58B,OACH48B,EAAG58B,QAEP48B,EAAG5mB,YAAYpR,OAAOC,OAAO,CAAET,MAAMm8B,GAAMzC,EAAU,GAE7D","sources":["webpack://aleo-website/../src/account.ts","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/offline-key-provider.ts","webpack://aleo-website/../src/record-provider.ts","webpack://aleo-website/../src/managed-worker.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js","webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs"],"sourcesContent":["import {\n Address,\n PrivateKey,\n Signature,\n ViewKey,\n PrivateKeyCiphertext,\n RecordCiphertext,\n} from \"./index\";\n\ninterface AccountParam {\n privateKey?: string;\n seed?: Uint8Array;\n}\n\n/**\n * Key Management class. Enables the creation of a new Aleo Account, importation of an existing account from\n * an existing private key or seed, and message signing and verification functionality.\n *\n * An Aleo Account is generated from a randomly generated seed (number) from which an account private key, view key,\n * and a public account address are derived. The private key lies at the root of an Aleo account. It is a highly\n * sensitive secret and should be protected as it allows for creation of Aleo Program executions and arbitrary value\n * transfers. The View Key allows for decryption of a user's activity on the blockchain. The Address is the public\n * address to which other users of Aleo can send Aleo credits and other records to. This class should only be used\n * environments where the safety of the underlying key material can be assured.\n *\n * @example\n * // Create a new account\n * const myRandomAccount = new Account();\n *\n * // Create an account from a randomly generated seed\n * const seed = new Uint8Array([94, 91, 52, 251, 240, 230, 226, 35, 117, 253, 224, 210, 175, 13, 205, 120, 155, 214, 7, 169, 66, 62, 206, 50, 188, 40, 29, 122, 40, 250, 54, 18]);\n * const mySeededAccount = new Account({seed: seed});\n *\n * // Create an account from an existing private key\n * const myExistingAccount = new Account({privateKey: 'myExistingPrivateKey'})\n *\n * // Sign a message\n * const hello_world = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = myRandomAccount.sign(hello_world)\n *\n * // Verify a signature\n * myRandomAccount.verify(hello_world, signature)\n */\nexport class Account {\n _privateKey: PrivateKey;\n _viewKey: ViewKey;\n _address: Address;\n\n constructor(params: AccountParam = {}) {\n try {\n this._privateKey = this.privateKeyFromParams(params);\n } catch (e) {\n console.error(\"Wrong parameter\", e);\n throw new Error(\"Wrong Parameter\");\n }\n this._viewKey = ViewKey.from_private_key(this._privateKey);\n this._address = Address.from_private_key(this._privateKey);\n }\n\n /**\n * Attempts to create an account from a private key ciphertext\n * @param {PrivateKeyCiphertext | string} ciphertext\n * @param {string} password\n * @returns {PrivateKey | Error}\n *\n * @example\n * const ciphertext = PrivateKey.newEncrypted(\"password\");\n * const account = Account.fromCiphertext(ciphertext, \"password\");\n */\n public static fromCiphertext(ciphertext: PrivateKeyCiphertext | string, password: string) {\n try {\n ciphertext = (typeof ciphertext === \"string\") ? PrivateKeyCiphertext.fromString(ciphertext) : ciphertext;\n const _privateKey = PrivateKey.fromPrivateKeyCiphertext(ciphertext, password);\n return new Account({ privateKey: _privateKey.to_string() });\n } catch(e) {\n throw new Error(\"Wrong password or invalid ciphertext\");\n }\n }\n\n private privateKeyFromParams(params: AccountParam) {\n if (params.seed) {\n return PrivateKey.from_seed_unchecked(params.seed);\n }\n if (params.privateKey) {\n return PrivateKey.from_string(params.privateKey);\n }\n return new PrivateKey();\n }\n\n privateKey() {\n return this._privateKey;\n }\n\n viewKey() {\n return this._viewKey;\n }\n\n address() {\n return this._address;\n }\n\n toString() {\n return this.address().to_string()\n }\n\n /**\n * Encrypt the account's private key with a password\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n *\n * @example\n * const account = new Account();\n * const ciphertext = account.encryptAccount(\"password\");\n */\n encryptAccount(password: string) {\n return this._privateKey.toCiphertext(password);\n }\n\n /**\n * Decrypts a Record in ciphertext form into plaintext\n * @param {string} ciphertext\n * @returns {Record}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecord(\"record1ciphertext\");\n */\n decryptRecord(ciphertext: string) {\n return this._viewKey.decrypt(ciphertext);\n }\n\n /**\n * Decrypts an array of Records in ciphertext form into plaintext\n * @param {string[]} ciphertexts\n * @returns {Record[]}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecords([\"record1ciphertext\", \"record2ciphertext\"]);\n */\n decryptRecords(ciphertexts: string[]) {\n return ciphertexts.map((ciphertext) => this._viewKey.decrypt(ciphertext));\n }\n\n /**\n * Determines whether the account owns a ciphertext record\n * @param {RecordCipherText | string} ciphertext\n * @returns {boolean}\n *\n * @example\n * // Create a connection to the Aleo network and an account\n * const connection = new NodeConnection(\"vm.aleo.org/api\");\n * const account = Account.fromCiphertext(\"ciphertext\", \"password\");\n *\n * // Get a record from the network\n * const record = connection.getBlock(1234);\n * const recordCipherText = record.transactions[0].execution.transitions[0].id;\n *\n * // Check if the account owns the record\n * if account.ownsRecord(recordCipherText) {\n * // Then one can do something like:\n * // Decrypt the record and check if it's spent\n * // Store the record in a local database\n * // Etc.\n * }\n */\n ownsRecordCiphertext(ciphertext: RecordCiphertext | string) {\n if (typeof ciphertext === 'string') {\n try {\n const ciphertextObject = RecordCiphertext.fromString(ciphertext);\n return ciphertextObject.isOwner(this._viewKey);\n }\n catch (e) {\n return false;\n }\n }\n else {\n return ciphertext.isOwner(this._viewKey);\n }\n }\n\n /**\n * Signs a message with the account's private key.\n * Returns a Signature.\n *\n * @param {Uint8Array} message\n * @returns {Signature}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * account.sign(message);\n */\n sign(message: Uint8Array) {\n return this._privateKey.sign(message);\n }\n\n /**\n * Verifies the Signature on a message.\n *\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = account.sign(message);\n * account.verify(message, signature);\n */\n verify(message: Uint8Array, signature: Signature) {\n return this._address.verify(message, signature);\n }\n\n}\n","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n FunctionKeyProvider,\n KeySearchParams,\n FunctionKeyPair,\n CachedKeyPair,\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\n\n/**\n * Search parameters for the offline key provider. This class implements the KeySearchParams interface and includes\n * a convenience method for creating a new instance of this class for each function of the credits.aleo program.\n *\n * @example\n * // If storing a key for a custom program function\n * offlineSearchParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * // If storing a key for a credits.aleo program function\n * bondPublicKeyParams = OfflineSearchParams.bondPublicKeyParams();\n */\nclass OfflineSearchParams implements KeySearchParams {\n cacheKey: string | undefined;\n verifyCreditsKeys: boolean | undefined;\n\n /**\n * Create a new OfflineSearchParams instance.\n *\n * @param {string} cacheKey - Key used to store the local function proving & verifying keys. This should be stored\n * under the naming convention \"programName/functionName\" (i.e. \"myprogram.aleo/myfunction\")\n * @param {boolean} verifyCreditsKeys - Whether to verify the keys against the credits.aleo program,\n * defaults to false, but should be set to true if using keys from the credits.aleo program\n */\n constructor(cacheKey: string, verifyCreditsKeys = false) {\n this.cacheKey = cacheKey;\n this.verifyCreditsKeys = verifyCreditsKeys;\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_public function of the credits.aleo program.\n */\n static bondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_validator function of the credits.aleo program.\n */\n static bondValidatorKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_validator.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the claim_unbond_public function of the\n */\n static claimUnbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_private function of the credits.aleo program.\n */\n static feePrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_public function of the credits.aleo program.\n */\n static feePublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the inclusion prover function.\n */\n static inclusionKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.inclusion.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the join function of the credits.aleo program.\n */\n static joinKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.join.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the set_validator_state function of the credits.aleo program.\n */\n static setValidatorStateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.set_validator_state.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the split function of the credits.aleo program.\n */\n static splitKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.split.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private function of the credits.aleo program.\n */\n static transferPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private_to_public function of the credits.aleo program.\n */\n static transferPrivateToPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public function of the credits.aleo program.\n */\n static transferPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_as_signer function of the credits.aleo program.\n */\n static transferPublicAsSignerKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_as_signer.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_to_private function of the credits.aleo program.\n */\n static transferPublicToPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the unbond_public function of the credits.aleo program.\n */\n static unbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.unbond_public.locator, true);\n }\n}\n\n/**\n * A key provider meant for building transactions offline on devices such as hardware wallets. This key provider is not\n * able to contact the internet for key material and instead relies on the user to insert Aleo function proving &\n * verifying keys from local storage prior to usage.\n *\n * @example\n * // Create an offline program manager\n * const programManager = new ProgramManager();\n *\n * // Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * // Create the proving keys from the key bytes on the offline machine\n * console.log(\"Creating proving keys from local key files\");\n * const program = \"program hello_hello.aleo; function hello: input r0 as u32.public; input r1 as u32.private; add r0 r1 into r2; output r2 as u32.private;\";\n * const myFunctionProver = await getLocalKey(\"/path/to/my/function/hello_hello.prover\");\n * const myFunctionVerifier = await getLocalKey(\"/path/to/my/function/hello_hello.verifier\");\n * const feePublicProvingKeyBytes = await getLocalKey(\"/path/to/credits.aleo/feePublic.prover\");\n *\n * myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProver);\n * myFunctionVerifyingKey = VerifyingKey.fromBytes(myFunctionVerifier);\n * const feePublicProvingKey = ProvingKey.fromBytes(feePublicKeyBytes);\n *\n * // Create an offline key provider\n * console.log(\"Creating offline key provider\");\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys\n * // Cache the proving and verifying keys for the custom hello function\n * OfflineKeyProvider.cacheKeys(\"hello_hello.aleo/hello\", myFunctionProvingKey, myFunctionVerifyingKey);\n *\n * // Cache the proving key for the fee_public function (the verifying key is automatically cached)\n * OfflineKeyProvider.insertFeePublicKey(feePublicProvingKey);\n *\n * // Create an offline query using the latest state root in order to create the inclusion proof\n * const offlineQuery = new OfflineQuery(\"latestStateRoot\");\n *\n * // Insert the key provider into the program manager\n * programManager.setKeyProvider(offlineKeyProvider);\n *\n * // Create the offline search params\n * const offlineSearchParams = new OfflineSearchParams(\"hello_hello.aleo/hello\");\n *\n * // Create the offline transaction\n * const offlineExecuteTx = await this.buildExecutionTransaction(\"hello_hello.aleo\", \"hello\", 1, false, [\"5u32\", \"5u32\"], undefined, offlineSearchParams, undefined, undefined, undefined, undefined, offlineQuery, program);\n *\n * // Broadcast the transaction later on a machine with internet access\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const txId = await networkClient.broadcastTransaction(offlineExecuteTx);\n */\nclass OfflineKeyProvider implements FunctionKeyProvider {\n cache: Map;\n\n constructor() {\n this.cache = new Map();\n }\n\n /**\n * Get bond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondPublicKeyParams());\n };\n\n /**\n * Get bond_validator function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondValidatorKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondValidatorKeyParams());\n };\n\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.claimUnbondPublicKeyParams());\n };\n\n /**\n * Get arbitrary function key from the offline key provider cache.\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * /// First cache the keys from local offline resources\n * const offlineKeyProvider = new OfflineKeyProvider();\n * const myFunctionVerifyingKey = VerifyingKey.fromString(\"verifier...\");\n * const myFunctionProvingKeyBytes = await readBinaryFile('./resources/myfunction.prover');\n * const myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProvingKeyBytes);\n *\n * /// Cache the keys for future use with a memorable locator\n * offlineKeyProvider.cacheKeys(\"myprogram.aleo/myfunction\", [myFunctionProvingKey, myFunctionVerifyingKey]);\n *\n * /// When they're needed, retrieve the keys from the cache\n *\n * /// First create a search parameter object with the same locator used to cache the keys\n * const keyParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * /// Then retrieve the keys\n * const [myFunctionProver, myFunctionVerifier] = await offlineKeyProvider.functionKeys(keyParams);\n */\n functionKeys(params?: KeySearchParams): Promise {\n return new Promise((resolve, reject) => {\n if (params === undefined) {\n reject(new Error(\"No search parameters provided, cannot retrieve keys\"));\n } else {\n const keyId = params.cacheKey;\n const verifyCreditsKeys = params.verifyCreditsKeys;\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId) as CachedKeyPair;\n const provingKey = ProvingKey.fromBytes(provingKeyBytes);\n const verifyingKey = VerifyingKey.fromBytes(verifyingKeyBytes);\n if (verifyCreditsKeys) {\n const keysMatchExpected = this.verifyCreditsKeys(keyId, provingKey, verifyingKey)\n if (!keysMatchExpected) {\n reject (new Error(`Cached keys do not match expected keys for ${keyId}`));\n }\n }\n resolve([provingKey, verifyingKey]);\n } else {\n reject(new Error(\"Keys not found in cache for \" + keyId));\n }\n }\n });\n };\n\n /**\n * Determines if the keys for a given credits function match the expected keys.\n *\n * @returns {boolean} Whether the keys match the expected keys\n */\n verifyCreditsKeys(locator: string, provingKey: ProvingKey, verifyingKey: VerifyingKey): boolean {\n switch (locator) {\n case CREDITS_PROGRAM_KEYS.bond_public.locator:\n return provingKey.isBondPublicProver() && verifyingKey.isBondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.locator:\n return provingKey.isClaimUnbondPublicProver() && verifyingKey.isClaimUnbondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.fee_private.locator:\n return provingKey.isFeePrivateProver() && verifyingKey.isFeePrivateVerifier();\n case CREDITS_PROGRAM_KEYS.fee_public.locator:\n return provingKey.isFeePublicProver() && verifyingKey.isFeePublicVerifier();\n case CREDITS_PROGRAM_KEYS.inclusion.locator:\n return provingKey.isInclusionProver() && verifyingKey.isInclusionVerifier();\n case CREDITS_PROGRAM_KEYS.join.locator:\n return provingKey.isJoinProver() && verifyingKey.isJoinVerifier();\n case CREDITS_PROGRAM_KEYS.set_validator_state.locator:\n return provingKey.isSetValidatorStateProver() && verifyingKey.isSetValidatorStateVerifier();\n case CREDITS_PROGRAM_KEYS.split.locator:\n return provingKey.isSplitProver() && verifyingKey.isSplitVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private.locator:\n return provingKey.isTransferPrivateProver() && verifyingKey.isTransferPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator:\n return provingKey.isTransferPrivateToPublicProver() && verifyingKey.isTransferPrivateToPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public.locator:\n return provingKey.isTransferPublicProver() && verifyingKey.isTransferPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator:\n return provingKey.isTransferPublicToPrivateProver() && verifyingKey.isTransferPublicToPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.unbond_public.locator:\n return provingKey.isUnbondPublicProver() && verifyingKey.isUnbondPublicVerifier();\n default:\n return false;\n }\n }\n\n /**\n * Get fee_private function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePrivateKeyParams());\n };\n\n /**\n * Get fee_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePublicKeyParams());\n };\n\n /**\n * Get join function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.joinKeyParams());\n };\n\n /**\n * Get split function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.splitKeyParams());\n };\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program.\n *\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new OfflineKeyProvider\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys for future use with the official locator\n * const transferPublicProvingKeyBytes = await readBinaryFile('./resources/transfer_public.prover.a74565e');\n * const transferPublicProvingKey = ProvingKey.fromBytes(transferPublicProvingKeyBytes);\n *\n * // Cache the transfer_public keys for future use with the OfflinKeyProvider's convenience method for\n * // transfer_public (the verifying key will be cached automatically)\n * offlineKeyProvider.insertTransferPublicKeys(transferPublicProvingKey);\n *\n * /// When they're needed, retrieve the keys from the cache\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateKeyParams());\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateToPublicKeyParams());\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicKeyParams());\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicAsSignerKeyParams());\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicToPrivateKeyParams());\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async unBondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.unbondPublicKeyParams());\n };\n\n /**\n * Insert the proving and verifying keys for the bond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for bond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertBondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isBondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [provingKey.toBytes(), VerifyingKey.bondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for bond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the claim_unbond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for claim_unbond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertClaimUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isClaimUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, [provingKey.toBytes(), VerifyingKey.claimUnbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for claim_unbond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_private.locator, [provingKey.toBytes(), VerifyingKey.feePrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePublicKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_public.locator, [provingKey.toBytes(), VerifyingKey.feePublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the join function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for join before inserting them into the cache.\n *\n * @param provingKey\n */\n insertJoinKeys(provingKey: ProvingKey) {\n if (provingKey.isJoinProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.join.locator, [provingKey.toBytes(), VerifyingKey.joinVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for join\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the set_validator_state function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for set_validator_state before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSetValidatorStateKeys(provingKey: ProvingKey) {\n if (provingKey.isSetValidatorStateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.set_validator_state.locator, [provingKey.toBytes(), VerifyingKey.setValidatorStateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for set_validator_state\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the split function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for split before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSplitKeys(provingKey: ProvingKey) {\n if (provingKey.isSplitProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.split.locator, [provingKey.toBytes(), VerifyingKey.splitVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for split\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private_to_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private_to_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateToPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateToPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateToPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private_to_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public.locator, [provingKey.toBytes(), VerifyingKey.transferPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public_to_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public_to_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicToPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicToPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, [provingKey.toBytes(), VerifyingKey.transferPublicToPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public_to_private\");\n }\n }\n\n insertUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.unbond_public.locator, [provingKey.toBytes(), VerifyingKey.unbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for unbond_public\");\n }\n }\n}\n\n\nexport {OfflineKeyProvider, OfflineSearchParams}\n","import { logAndThrow, RecordPlaintext } from \"./index\";\nimport { Account } from \"./account\";\nimport { AleoNetworkClient } from \"./network-client\";\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface RecordSearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * Interface for a record provider. A record provider is used to find records for use in deployment and execution\n * transactions on the Aleo Network. A default implementation is provided by the NetworkRecordProvider class. However,\n * a custom implementation can be provided (say if records are synced locally to a database from the network) by\n * implementing this interface.\n */\ninterface RecordProvider {\n account: Account\n\n /**\n * Find a credits.aleo record with a given number of microcredits from the chosen provider\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, its nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const record2 = await recordProvider.findCreditsRecord(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find a list of credit.aleo records with a given number of microcredits from the chosen provider\n *\n * @param {number} microcreditAmounts A list of separate microcredit amounts to search for (e.g. [5000, 100000])\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} A list of records with a value greater or equal to the amounts specified if such records exist, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const records = await recordProvider.findCreditsRecords([5000, 5000], true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const nonces = [];\n * records.forEach(record => { nonces.push(record.nonce()) });\n * const records2 = await recordProvider.findCreditsRecord(5000, true, nonces);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecords(microcreditAmounts: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find an arbitrary record\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * program: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.program = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, \"credits.aleo\", \"credits\");\n *\n * const record = await recordProvider.findRecord(true, [], params);\n */\n findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find multiple records from arbitrary programs\n *\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * maxRecords: number;\n * programName: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.maxRecords = maxRecords;\n * this.programName = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, 2, \"credits.aleo\", \"credits\");\n * const records = await recordProvider.findRecord(true, [], params);\n */\n findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n}\n\n/**\n * A record provider implementation that uses the official Aleo API to find records for usage in program execution and\n * deployment, wallet functionality, and other use cases.\n */\nclass NetworkRecordProvider implements RecordProvider {\n account: Account;\n networkClient: AleoNetworkClient;\n constructor(account: Account, networkClient: AleoNetworkClient) {\n this.account = account;\n this.networkClient = networkClient;\n }\n\n /**\n * Set the account used to search for records\n *\n * @param {Account} account The account to use for searching for records\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Find a list of credit records with a given number of microcredits by via the official Aleo API\n *\n * @param {number[]} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * */\n async findCreditsRecords(microcredits: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n let startHeight = 0;\n let endHeight = 0;\n\n if (searchParameters) {\n if (\"startHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n startHeight = searchParameters[\"startHeight\"];\n }\n\n if (\"endHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n endHeight = searchParameters[\"endHeight\"];\n }\n }\n\n // If the end height is not specified, use the current block height\n if (endHeight == 0) {\n const end = await this.networkClient.getLatestHeight();\n if (end instanceof Error) {\n throw logAndThrow(\"Unable to get current block height from the network\")\n }\n endHeight = end;\n }\n\n // If the start height is greater than the end height, throw an error\n if (startHeight >= endHeight) {\n throw logAndThrow(\"Start height must be less than end height\");\n }\n\n return await this.networkClient.findUnspentRecords(startHeight, endHeight, this.account.privateKey(), microcredits, undefined, nonces);\n }\n\n /**\n * Find a credit record with a given number of microcredits by via the official Aleo API\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n async findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n const records = await this.findCreditsRecords([microcredits], unspent, nonces, searchParameters);\n if (!(records instanceof Error) && records.length > 0) {\n return records[0];\n }\n console.error(\"Record not found with error:\", records);\n return new Error(\"Record not found\");\n }\n\n /**\n * Find an arbitrary record. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n /**\n * Find multiple arbitrary records. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n}\n\n/**\n * BlockHeightSearch is a RecordSearchParams implementation that allows for searching for records within a given\n * block height range.\n *\n * @example\n * // Create a new BlockHeightSearch\n * const params = new BlockHeightSearch(89995, 99995);\n *\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits and the block height search\n * // can be used to find records within a given block height range\n * const record = await recordProvider.findCreditsRecord(5000, true, [], params);\n *\n */\nclass BlockHeightSearch implements RecordSearchParams {\n startHeight: number;\n endHeight: number;\n constructor(startHeight: number, endHeight: number) {\n this.startHeight = startHeight;\n this.endHeight = endHeight;\n }\n}\n\nexport { BlockHeightSearch, NetworkRecordProvider, RecordProvider, RecordSearchParams};\n","// Experimental example where SDK manages worker\n\nimport { wrap } from \"comlink\";\nimport { WorkerAPI } from './worker';\n\nlet singletonWorker: WorkerAPI | null = null;\n\nconst createAleoWorker = (): WorkerAPI => {\n if (!singletonWorker) {\n const worker = new Worker(new URL(\"worker.js\", import.meta.url), {\n type: \"module\",\n });\n singletonWorker = wrap(worker);\n }\n return singletonWorker;\n};\n\nexport { createAleoWorker };","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n","/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n"],"names":["Account","_privateKey","_viewKey","_address","constructor","params","this","privateKeyFromParams","e","console","error","Error","ViewKey","from_private_key","Address","fromCiphertext","ciphertext","password","PrivateKeyCiphertext","fromString","PrivateKey","fromPrivateKeyCiphertext","privateKey","to_string","seed","from_seed_unchecked","from_string","viewKey","address","toString","encryptAccount","toCiphertext","decryptRecord","decrypt","decryptRecords","ciphertexts","map","ownsRecordCiphertext","isOwner","RecordCiphertext","sign","message","verify","signature","async","get","url","options","response","fetch","ok","status","post","method","AleoNetworkClient","host","headers","account","setAccount","getAccount","setHost","fetchData","json","findUnspentRecords","startHeight","endHeight","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","value","recordPlaintext","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","warn","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","inner","unBondPublicKeys","OfflineSearchParams","verifyCreditsKeys","bondPublicKeyParams","bondValidatorKeyParams","claimUnbondPublicKeyParams","feePrivateKeyParams","feePublicKeyParams","inclusionKeyParams","joinKeyParams","setValidatorStateKeyParams","splitKeyParams","transferPrivateKeyParams","transferPrivateToPublicKeyParams","transferPublicKeyParams","transferPublicAsSignerKeyParams","transferPublicToPrivateKeyParams","unbondPublicKeyParams","OfflineKeyProvider","Promise","resolve","reject","undefined","isBondPublicProver","isBondPublicVerifier","isClaimUnbondPublicProver","isClaimUnbondPublicVerifier","isFeePrivateProver","isFeePrivateVerifier","isFeePublicProver","isFeePublicVerifier","isInclusionProver","isInclusionVerifier","isJoinProver","isJoinVerifier","isSetValidatorStateProver","isSetValidatorStateVerifier","isSplitProver","isSplitVerifier","isTransferPrivateProver","isTransferPrivateVerifier","isTransferPrivateToPublicProver","isTransferPrivateToPublicVerifier","isTransferPublicProver","isTransferPublicVerifier","isTransferPublicToPrivateProver","isTransferPublicToPrivateVerifier","isUnbondPublicProver","isUnbondPublicVerifier","insertBondPublicKeys","bondPublicVerifier","insertClaimUnbondPublicKeys","claimUnbondPublicVerifier","insertFeePrivateKeys","feePrivateVerifier","insertFeePublicKeys","feePublicVerifier","insertJoinKeys","joinVerifier","insertSetValidatorStateKeys","setValidatorStateVerifier","insertSplitKeys","splitVerifier","insertTransferPrivateKeys","transferPrivateVerifier","insertTransferPrivateToPublicKeys","transferPrivateToPublicVerifier","insertTransferPublicKeys","transferPublicVerifier","insertTransferPublicToPrivateKeys","transferPublicToPrivateVerifier","insertUnbondPublicKeys","unbondPublicVerifier","NetworkRecordProvider","networkClient","findCreditsRecords","unspent","searchParameters","findCreditsRecord","findRecord","findRecords","BlockHeightSearch","singletonWorker","createAleoWorker","worker","Worker","URL","wrap","ProgramManager","keyProvider","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initializeWasm","spawnWorker","module","memory","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","fill","getObject","idx","heap_next","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","cachedUint8Memory0","getUint8Memory0","buffer","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","isArray","builtInMatches","exec","call","className","JSON","stringify","_","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7","AddressFinalization","__wbg_address_free","__wrap","create","prototype","__destroy_into_raw","free","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","address_from_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","executionresponse_getExecution","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","executionresponse_getVerifyingKey","executionresponse_getFunctionId","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","ptr1","keypair_new","keypair_provingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","__wbg_get_metadata_name","__wbg_set_metadata_name","__wbg_get_metadata_locator","__wbg_set_metadata_locator","__wbg_get_metadata_prover","__wbg_set_metadata_prover","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","metadata_baseUrl","metadata_bond_public","metadata_bond_validator","metadata_claim_unbond_public","metadata_fee_private","metadata_fee_public","metadata_inclusion","metadata_join","metadata_set_validator_state","metadata_split","metadata_transfer_private","metadata_transfer_private_to_public","metadata_transfer_public","metadata_transfer_public_as_signer","metadata_transfer_public_to_private","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","privatekey_new","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","privatekey_toCiphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","program_fromString","program_toString","hasFunction","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","program_getCreditsProgram","program_id","program_address","isEqual","other","program_isEqual","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","fee_credits","fee_record","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","asUintN","_function","prove_execution","len4","programmanager_executeFunctionOffline","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","amount_credits","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","provingkey_isClaimUnbondPublicProver","provingkey_isFeePrivateProver","provingkey_isFeePublicProver","provingkey_isInclusionProver","provingkey_isJoinProver","provingkey_isSetValidatorStateProver","provingkey_isSplitProver","provingkey_isTransferPrivateProver","provingkey_isTransferPrivateToPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","provingkey_isTransferPublicToPrivateProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","bytes","provingkey_fromBytes","string","provingkey_fromString","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","recordciphertext_fromString","recordciphertext_toString","recordciphertext_decrypt","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","recordplaintext_microcredits","recordplaintext_nonce","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","verifyingkey_claimUnbondPublicVerifier","verifyingkey_feePrivateVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","verifyingkey_joinVerifier","verifyingkey_setValidatorStateVerifier","verifyingkey_splitVerifier","verifyingkey_transferPrivateVerifier","verifyingkey_transferPrivateToPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","verifyingkey_transferPublicToPrivateVerifier","verifyingkey_unbondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","verifyingkey_isClaimUnbondPublicVerifier","verifyingkey_isFeePrivateVerifier","verifyingkey_isFeePublicVerifier","verifyingkey_isInclusionVerifier","verifyingkey_isJoinVerifier","verifyingkey_isSetValidatorStateVerifier","verifyingkey_isSplitVerifier","verifyingkey_isTransferPrivateVerifier","verifyingkey_isTransferPrivateToPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicToPrivateVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","__wbg_load","Response","WebAssembly","instantiateStreaming","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","__wbg_status_d485fb5a478426fb","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_transaction_new","Transaction$1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","__wbg_fetch_bc7c8e27076a5c84","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","freeze","__proto__","Metadata$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info","proxyMarker","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","transferHandlers","canHandle","serialize","port1","port2","MessageChannel","expose","deserialize","port","serialized","isError","ep","allowedOrigins","callback","ev","origin","allowedOrigin","RegExp","test","isAllowedOrigin","path","argumentList","fromWireValue","returnValue","parent","reduce","prop","rawValue","proxy","transfers","transferCache","catch","wireValue","transferables","toWireValue","removeEventListener","closeEndPoint","TypeError","endpoint","isMessagePort","close","target","createProxy","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","newCount","isProxyReleased","Proxy","_target","unregisterProxy","r","p","bind","_thisArg","rawArgumentList","last","processArguments","construct","registerProxy","processed","v","arr","concat","handler","serializedValue","msg","floor","random","Number","MAX_SAFE_INTEGER"],"sourceRoot":""} \ No newline at end of file diff --git a/530.bundle.js.map b/530.bundle.js.map index 855b05b5a..fe5449411 100644 --- a/530.bundle.js.map +++ b/530.bundle.js.map @@ -1 +1 @@ -{"version":3,"file":"530.bundle.js","mappings":";UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,+KCAGC,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,sBAAwBN,GAG9D,OAAOE,CACX,CAGOJ,eAAeS,EAAKP,EAAmBC,GAC1CA,EAAQO,OAAS,OAEjB,MAAMN,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,uBAAyBN,GAG/D,OAAOE,CACX,CCUA,MAAMO,EACJC,KACAC,QACAC,QAEAC,WAAAA,CAAYH,EAAcT,GACxBa,KAAKJ,KAAOA,EAAO,WAEfT,GAAWA,EAAQU,QACrBG,KAAKH,QAAUV,EAAQU,QAGvBG,KAAKH,QAAU,CAEb,qBAAsB,UAa5BI,UAAAA,CAAWH,GACTE,KAAKF,QAAUA,EASjBI,UAAAA,GACE,OAAOF,KAAKF,QASdK,OAAAA,CAAQP,GACNI,KAAKJ,KAAOA,EAAO,WAGrB,eAAMQ,CACFlB,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIe,KAAKJ,KAAOV,EAAK,CAC1CW,QAASG,KAAKH,UAGhB,aAAaT,EAASiB,MACrB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,uBACjB,EA0BH,wBAAMgB,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIjB,MAAM,mDAIlB,MAAMuB,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfZ,EAA4B,CACrC,QAA4B,IAAjBV,KAAKF,QACd,MAAM,IAAIP,MAAM,oGAEhB2B,EAAqBlB,KAAKF,QAAQyB,WAErC,MACC,IACEL,EAAqBR,aAAsBc,EAAAA,GAAad,EAAac,EAAAA,GAAWC,YAAYf,EAC7F,CAAC,MAAOJ,GACP,MAAM,IAAIf,MAAM,sCACjB,CAEH,MAAMmC,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoB5B,KAAK6B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIrC,MAAM,uCAFhB4B,EAAeS,CAIlB,CAAC,MAAOtB,GACP,MAAM,IAAIf,MAAM,sCACjB,CAUD,GANE0B,EADuB,iBAAdR,GAA0BA,GAAaU,EAC1CV,EAEAU,EAIJX,EAAcS,EAChB,MAAM,IAAI1B,MAAM,0DAIlB,KAAO0B,EAAMT,GAAa,CACxBQ,EAAQC,EAAM,GACVD,EAAQR,IACVQ,EAAQR,GAEV,IAEE,MAAMsB,QAAe9B,KAAK+B,cAAcf,EAAOC,GAE/C,GADAA,EAAMD,IACAc,aAAkBvC,OAEtB,IAAK,IAAIyC,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAASC,EAAAA,GAAiBC,WAAWH,EAAOI,OAElD,GAAIH,EAAOI,QAAQzB,GAAU,CAE3B,MAAM0B,EAAkBL,EAAOM,QAAQ3B,GAGjC4B,EAAQF,EAAgBE,QAC9B,GAAIzC,EAAO0C,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBvC,EAAoB,eAAgB,WAE5F,UACQlB,KAAK0D,gBAAgBF,EAC5B,CAAC,MAAOlD,GAEP,IAAKK,IACHG,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQsB,OAAS,EAAG,CAC3D,IAAI4B,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiBjD,EAAQkD,GAAgB,CAIzD,GAHAA,GAAiB,EACjB/C,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQmB,QAAUtB,EAAQsB,OAC5B,OAAOnB,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAOR,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHAwD,QAAQC,KAAK,mCAAqC/C,EAAMgD,WAAa,IAAM/C,EAAI+C,YAC/EF,QAAQC,KAAK,UAAWzD,GACxBc,GAAY,EACRA,EAAW,GAEb,OADA0C,QAAQC,KAAK,0EACNjD,CAEV,CACF,CACD,OAAOA,EAUT,cAAMmD,CAASC,GACb,IAEE,aADoBlE,KAAKI,UAAiB,UAAY8D,EAEvD,CAAC,MAAO5D,GACP,MAAM,IAAIf,MAAM,wBACjB,EAWH,mBAAMwC,CAAcf,EAAeC,GACjC,IACE,aAAajB,KAAKI,UAAwB,iBAAmBY,EAAQ,QAAUC,EAChF,CAAC,MAAOX,GAEP,MAAM,IAAIf,MADW,iCAAmCyB,EAAQ,QAAUC,EAAM,IAEjF,EASH,0CAAMkD,CAAqCxB,GACrCA,aAAmByB,EAAAA,KACrBzB,EAAUA,EAAQqB,YAEpB,IAEE,aADiBhE,KAAKI,UAAkB,kCAAoCuC,IAClE0B,QAAQ,IAAM,GACzB,CAAC,MAAO/D,GACP,MAAM,IAAIf,MAAM,qDACjB,EASH,wCAAM+E,CAAmC3B,GACvC,IACE,MAAM4B,QAA+BvE,KAAKmE,qCAAqCxB,GAC/E,aAA+B3C,KAAKwE,eAAeD,EACpD,CAAC,MAAOjE,GACP,MAAM,IAAIf,MAAM,qDACjB,EASH,oBAAMkF,GACJ,IACE,aAAazE,KAAKI,UAAiB,gBACpC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,EAQH,wBAAMmF,GACJ,IACE,aAAa1E,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,+BACjB,EASH,qBAAMsC,GACJ,IACE,aAAa7B,KAAKI,UAAkB,iBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,gCACjB,EAcH,gBAAMoF,CAAWC,GACf,IACE,aAAa5E,KAAKI,UAAkB,YAAcwE,EACnD,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,yBACjB,EAoBH,sBAAMsF,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnB,WAAW6B,EAC3B,CAAC,MAAOxE,GACP,IACE,OAAO8D,EAAAA,GAAQnB,iBAA0BjD,KAAK2E,WAAWG,GAC1D,CAAC,MAAOxE,GACP,MAAM,IAAIf,MAAM,GAAGuF,iDACpB,CACF,EA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIlD,EAAI,EAAGA,EAAIiD,EAAWhD,OAAQD,IAAK,CAC1C,MAAMmD,EAAYF,EAAWjD,GAC7B,IAAKgD,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8BrF,KAAK2E,WAAWQ,GAC9CG,QAAsCtF,KAAK+E,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAO1E,GACP,MAAMkF,EAAY,mCAAqClF,EACxD,EAcH,2BAAMmF,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IACxFI,YAChB,CAAC,MAAO5E,GACP,MAAM,IAAIf,MAAM,8CAAgDe,EACjE,EAYH,4BAAMoF,CAAuBd,GAC3B,IACE,aAAa5E,KAAKI,UAAyB,YAAcwE,EAAY,YACtE,CAAC,MAAOtE,GACP,MAAM,IAAIf,MAAM,2FACjB,EAiBH,4BAAMoG,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAavF,KAAKI,UAAkB,YAAcwE,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAOjF,GACP,MAAM,IAAIf,MAAM,kFACjB,EASH,kBAAMsG,GACJ,IACE,aAAa7F,KAAKI,UAAkB,oBACrC,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCACjB,EAUH,oBAAMiF,CAAesB,GACnB,IACA,aAAa9F,KAAKI,UAA4B,gBAAkB0F,EAC/D,CAAC,MAAOxF,GACP,MAAM,IAAIf,MAAM,8BACjB,EAUH,qBAAMwG,CAAgB7B,GACpB,IACA,aAAalE,KAAKI,UAAmC,UAAY8D,EAAOF,WAAa,gBACpF,CAAC,MAAO1D,GACP,MAAM,IAAIf,MAAM,+BACjB,EASH,8BAAMyG,GACJ,IACE,aAAahG,KAAKI,UAAmC,2BACtD,CAAC,MAAOE,GACP,MAAM,IAAIf,MAAM,4CACjB,EAUH,qBAAMmE,CAAgBuC,GACpB,IACE,aAAajG,KAAKI,UAAkB,sBAAwB6F,EAC7D,CAAC,MAAO3F,GACP,MAAM,IAAIf,MAAM,gCACjB,EASH,uBAAM2G,CAAkB5D,GACtB,MAAM6D,EAAqB7D,aAAuB8D,EAAAA,GAAc9D,EAAY0B,WAAa1B,EACzF,IACE,MAAMlD,QAAiBK,EAAKO,KAAKJ,KAAO,yBAA0B,CAChEyG,KAAMF,EACNtG,QAASyG,OAAOC,OAAO,CAAC,EAAGvG,KAAKH,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaT,EAASiB,MAEvB,CAAC,MAAOC,GACP,MAAM,IAAIf,MAAM,qDAAsDe,EAAgBkG,UACvF,CACF,CAAC,MAAOlG,GACP,MAAM,IAAIf,MAAM,oDAAqDe,EAAgBkG,UACtF,GCjnBL,MAAMC,EACFC,KACAC,UACAC,YACAC,SAUA9G,WAAAA,CAAY+G,GACR9G,KAAK2G,UAAYG,EAAOH,UACxB3G,KAAK4G,YAAcE,EAAOF,YAC1B5G,KAAK6G,SAAWC,EAAOD,SACvB7G,KAAK0G,KAAOI,EAAOJ,MAyK3B,MAAMK,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFjI,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBkI,QAAahI,EAASiI,cAC5B,OAAO,IAAIC,WAAWF,EACrB,CAAC,MAAO9G,GACL,MAAM,IAAIf,MAAM,uBAAyBe,EAC5C,EAGLP,WAAAA,GACIC,KAAKkH,QAAUK,EACfvH,KAAKgH,MAAQ,IAAIQ,IACjBxH,KAAKiH,aAAc,EAQvBQ,QAAAA,CAASA,GACLzH,KAAKiH,YAAcQ,EAMvBC,UAAAA,GACI1H,KAAKgH,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC9H,KAAKgH,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAO7H,KAAKgH,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAO7H,KAAKgH,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/D,QAAQ0E,MAAM,2CAA2CX,KACrD7H,KAAKgH,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC1I,KAAKgH,MAAM/H,IAAI4I,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAInJ,MAAM,2BAwBzB,kBAAMuJ,CAAahC,GACf,GAAIA,EAAQ,CACR,IAAIiC,EACAC,EACAnC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIvB,EAAM0D,EAAqBC,OAAOpC,EAAa,MACnD,KAAMvB,aAAehG,OACjB,OAAOS,KAAKmJ,iBAAiB5D,EAEpC,CAcD,GAZI,cAAeuB,GAAwC,iBAAvBA,EAAkB,YAClDiC,EAAYjC,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDkC,EAAclC,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5BiC,GAAaC,EACb,aAAahJ,KAAKoJ,gBAAgBL,EAAWC,EAAanC,GAG9D,GAAIA,EACA,OAAO7G,KAAKuI,QAAQ1B,EAE3B,CACD,MAAMtH,MAAM,oGA4BhB,qBAAM6J,CAAgBL,EAAmBC,EAAqBnC,GAC1D,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,MAAO,CAACyF,EAAAA,GAAWC,UAAU1F,EAAM,IAAK2F,EAAAA,GAAaD,UAAU1F,EAAM,KAClE,CACHY,QAAQ0E,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAC1EjF,QAAQ0E,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoChI,KAAKqJ,gBAAgBL,GAE/D,OADAhJ,KAAKgH,MAAMiB,IAAIpB,EAAU,CAACkB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAE1E,MAAO,CAAChB,QADkC/H,KAAKqJ,gBAAgBL,GAElE,CACJ,CAAC,MAAO1I,GACL,MAAM,IAAIf,MAAgB,UAAAe,kDAAsDyI,SAAiBC,KACpG,EAWL,qBAAMM,CAAgBP,EAAmBlC,GACrC,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,OAAOyF,EAAAA,GAAWC,UAAU1F,EAAM,IAElCY,QAAQ0E,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,GAGjF,CAAC,MAAOzI,GACL,MAAM,IAAIf,MAAM,UAAUe,oCAAwCyI,IACrE,EAGL,sBAAMI,CAAiB5D,GACnB,IACI,GAAKvF,KAAKgH,MAAMoB,IAAI7C,EAAIgE,UAAavJ,KAAKiH,YAOnC,CACH,MAAMuC,EAAyBxJ,KAAKgH,MAAM/H,IAAIsG,EAAIgE,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgBlE,EAAIyC,eACpB0B,QAAgC1J,KAAKsJ,gBAAgB/D,EAAIoE,OAAQpE,EAAIgE,SAI3E,OAHIvJ,KAAKiH,aACLjH,KAAKgH,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAOnJ,GACL,MAAM,IAAIf,MAAM,sCAAsCe,IACzD,EAGL,oBAAMuJ,GACF,OAAO7J,KAAKmJ,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO9J,KAAKmJ,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOhK,KAAKmJ,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanK,KAAKmJ,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanK,KAAKmJ,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanK,KAAKmJ,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAItL,MAAM,2BASxB,cAAMuL,GACF,aAAa9K,KAAKmJ,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAahL,KAAKmJ,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAalL,KAAKmJ,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAapL,KAAKmJ,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBzC,GAClB,OAAQA,GACJ,KAAKqC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM5I,QAAiBH,EAAI2H,GACrB8E,QAAatM,EAASsM,OAC5B,OAAqB7C,EAAAA,GAAa5F,WAAWyI,EAChD,CAAC,MAAOC,GAEL,IACA,OAAqB9C,EAAAA,GAAaD,gBAAgB5I,KAAKmH,WAAWP,GACjE,CAAC,MAAOgF,GACL,OAAO,IAAIrM,MAAM,iCAAmCqM,EACvD,CACJ,GAIbC,gBAAAA,GACI,OAAO7L,KAAKmJ,iBAAiBF,EAAqBwC,gBC/hB1D,MAAMK,EACFhM,QACAiM,YACAnM,KACAoM,cACAC,eAQAlM,WAAAA,CAAYH,EAA2BmM,EAA+CE,GAClFjM,KAAKJ,KAAOA,GAAc,mCAC1BI,KAAKgM,cAAgB,IAAIrM,EAAkBK,KAAKJ,MAEhDI,KAAK+L,YAAcA,GAA4B,IAAIhF,EACnD/G,KAAKiM,eAAiBA,EAQ1BhM,UAAAA,CAAWH,GACPE,KAAKF,QAAUA,EAQnBoM,cAAAA,CAAeH,GACX/L,KAAK+L,YAAcA,EAQvB5L,OAAAA,CAAQP,GACJI,KAAKJ,KAAOA,EACZI,KAAKgM,cAAc7L,QAAQP,GAQ/BuM,iBAAAA,CAAkBF,GACdjM,KAAKiM,eAAiBA,EAkC1B,YAAMG,CACFzJ,EACA0J,EACAC,EACAC,EACAC,EACA9L,GAGA,IACI,MAAM+L,EAAgBrI,EAAAA,GAAQnB,WAAWN,GACzC,IAAI0C,EACJ,IACIA,QAAsBrF,KAAKgM,cAAcrH,WAAW8H,EAAc3G,KACrE,CAAC,MAAO6F,GAEL7H,QAAQ4I,IAAe,WAAAD,EAAc3G,mDACxC,CACD,GAA4B,iBAAjBT,EACP,KAAO,WAAWoH,EAAc3G,gEAEvC,CAAC,MAAO6F,GACL,MAAMnG,EAAY,6BAA6BmG,IAClD,CAGD,IAiBIgB,EAjBAC,EAAuBlM,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD8M,EAAuB5M,KAAKF,QAAQY,mBAGJ,IAAzBkM,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAI3H,EACJ,IACIA,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,EACxD,CAAC,MAAOgJ,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAGD,MAAMsB,QAAWC,EAAAA,EAAmBC,2BAA2BP,EAAsBjK,EAAS0J,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+H,EAAeC,GACjJ,aAAahN,KAAKgM,cAAc9F,kBAAkB+G,GA8BtD,+BAAMG,CAA0BjO,GAE5B,MAAM,YACFkO,EAAW,aACXC,EAAY,IACZjB,EAAG,WACHC,EAAU,OACViB,EAAM,mBACNhB,EAAkB,gBAClBiB,EAAe,WACf9M,EAAU,aACV+M,GACAtO,EAEJ,IAAIqN,EAAYrN,EAAQqN,UACpBzE,EAAa5I,EAAQ4I,WACrBC,EAAe7I,EAAQ6I,aACvBrF,EAAUxD,EAAQwD,QAClBqC,EAAU7F,EAAQ6F,QAGtB,QAAgB8H,IAAZnK,EACA,IACIA,QAAyB3C,KAAKgM,cAAcrH,WAAW0I,EAC1D,CAAC,MAAO1B,GACL,MAAMnG,EAA6B,iBAAA6H,yBAAmC1B,qGACzE,MACMhJ,aAAmByB,EAAAA,KAC1BzB,EAAUA,EAAQqB,YAItB,IAiBI2I,EAjBAe,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IACIlB,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAID,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAK5E,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAKL,GADwBvH,EAAAA,GAAQnB,WAAWN,GAASuC,aAAajD,OAC3C,IAAM+C,EACxB,IACIA,QAAgChF,KAAKgM,cAAcjH,kBAAkBsI,EACxE,CAAC,MAAO1B,GACL,MAAMnG,EAAY,qDAAqDmG,yGAC1E,CAIL,aAAauB,EAAAA,EAAmBE,0BAA0BM,EAAqB/K,EAAS2K,EAAcC,EAAQlB,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+C,EAAYC,EAAc+E,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQxO,GACV,MAAM8N,QAAwBjN,KAAKoN,0BAA0BjO,GAC7D,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAoCtD,SAAMW,CACFjL,EACAkL,EACAN,EACAO,EACA9I,EACAwI,EACAzF,EACAC,EACAtH,EACA+M,GAGA,IAAIC,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IAAK3F,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,EACrF,CAAC,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,4CACjE,CAOL,OAHA7H,QAAQ4I,IAAI,2BACZ5I,QAAQ4I,IAAI,gBAAiB3E,GAC7BjE,QAAQ4I,IAAI,kBAAmB1E,GACxBkF,EAAAA,EAAmBa,uBAAuBL,EAAqB/K,EAASkL,EAAeN,EAAQO,GAAgB,EAAO9I,EAAS+C,EAAYC,EAAchI,KAAKJ,KAAM6N,GAiB/K,UAAM1C,CACFiD,EACAC,EACA5B,EACAC,EACAC,EACAC,EACA9L,EACA+M,GAGA,IAUId,EACA7B,EAXA4C,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HN,QAAkC9K,KAAK+L,YAAYjB,UACtD,CAAC,MAAOa,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCuB,EAAgBC,GAAoBrD,EAG3C,IACI0B,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,CACnH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,IACIqC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBnL,WAAW+K,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBnL,WAAWgL,EAC7F,CAAC,MAAOtC,GACL,MAAMnG,EAAY,kFACrB,CAGD,MAAMyH,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW5B,EAAKG,EAAWxM,KAAKJ,KAAMsO,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,WAAMhC,CAAMqD,EAAqBC,EAAwC7N,EAAyB+M,GAE9F,IAUIzC,EAVA0C,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAKV,IACI1C,QAAmChL,KAAK+L,YAAYf,WACvD,CAAC,MAAOW,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAO6C,EAAiBC,GAAqBzD,EAG7C,IACIuD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBnL,WAAWsL,EACtG,CAAC,MAAO5C,GACL,MAAMnG,EAAY,8EACrB,CAGD,MAAMyH,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcvO,KAAKJ,KAAM4O,EAAiBC,EAAmBhB,GACzJ,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAatD,oBAAM0B,CACFhM,EACAiM,EACArB,EACA7M,GAGA,IAAIsE,EAEA0I,EAAsBhN,OACS,IAAxBgN,IAEHA,OADwB,IAAjB1N,KAAKF,QACUE,KAAKF,QAAQY,aAEb,IAAIc,EAAAA,IAKlC,IACIwD,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACrD,MAAM6G,QAAgB0D,EAAAA,EAAmB2B,kBACrCnB,EACA/K,EACAiM,EACArB,EACAvI,GAEJ,MAAO,CAAawE,EAAQzB,aAA4ByB,EAAQxB,eACnE,CAAC,MAAO2D,GACL,MAAMnG,EAAY,qCAAqCmG,oEAC1D,EAgCL,8BAAMmD,CACFC,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUItC,EACAzC,EAXAwD,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HlB,QAAsClK,KAAK+L,YAAY7B,aAAa+E,EACvE,CAAC,MAAOtD,GACL,MAAMnG,EAAY,iDAAiDmG,+DACtE,CACD,MAAOoB,EAAeC,GAAmBL,GAClCwC,EAAoBC,GAAwBlF,EAGnD,IAEI,MAAMrJ,EAAmB,GACrBwO,EAAqBJ,IAErBV,QAAsCvO,KAAK6M,iBAAiBR,EAAK,GAAIkC,EAAchC,GACnF1L,EAAO8C,KAAK4K,EAAajL,UAEzBiL,OAAezB,EAEnBN,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAKxL,EAAQ2L,EAAWD,QAAsBO,CACvH,CAAC,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CAGD,aAAauB,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAclC,EAAKG,EAAWxM,KAAKJ,KAAMuP,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GAmB/H,4CAAM8B,CACFR,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAEA,MAAMR,QAAwBjN,KAAK8O,yBAAyBC,EAAQC,EAAWC,EAAc5C,EAAKC,EAAYC,EAAoBgC,EAAc/B,EAAW9L,EAAY+M,GACvK,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB5P,EAAmC,CAAC,GAChK,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa7L,iBAAgB,gBACjGwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBW,YAAYD,OAC5C/C,YAAaqC,EAAqBW,YAAY0B,SAC9CzE,SAAU,6BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB5P,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKyP,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ5P,GAC7H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/J,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa7L,gBAAiB,GAAGsM,EAAmBtM,gBAAe,gBACvHwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBc,eAAeJ,OAC/C/C,YAAaqC,EAAqBc,eAAeuB,SACjDzE,SAAU,gCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKoQ,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYlR,GAC5H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3G,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BjB,EAAMlN,EAAQkN,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgB,GAAGG,EAAa7L,iBAAgB,gBAC1DwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBwC,cAAc9B,OAC9C/C,YAAaqC,EAAqBwC,cAAcH,SAChDzE,SAAU,+BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,OAAOjQ,KAAKoN,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3F,MAAM8N,QAAwBjN,KAAKwQ,6BAA6Bd,EAAgBX,EAAQ5P,GACxF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,uCAAMyD,CAAkChB,EAAwBvQ,EAAmC,CAAC,GAChG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAMlN,EAAQkN,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBgB,oBAAoBN,OACpD/C,YAAaqC,EAAqBgB,oBAAoBqB,SACtDzE,SAAU,qCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwBvQ,EAAmC,CAAC,GAChF,MAAM8N,QAAwBjN,KAAK0Q,kCAAkChB,EAAgBvQ,GACrF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,uCAAM2D,CAAkCC,EAA0B1R,EAAmC,CAAC,GAClG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBiB,EAAS,CAACsD,EAAgB7M,YAAW,gBACrCwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBuC,oBAAoB7B,OACpD/C,YAAaqC,EAAqBuC,oBAAoBF,SACtDzE,SAAU,wCAEXoJ,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAK2N,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B1R,EAAmC,CAAC,GAClF,MAAM8N,QAAmBjN,KAAK4Q,kCAAkCC,EAAiB1R,GACjF,OAAOa,KAAKgM,cAAc9F,kBAAkB+G,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMzO,EAAuByO,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCvO,EAAUqO,EAAkBrM,aAC5BqD,EAAegJ,EAAkB3H,kBACvC,OAAO8H,EAAAA,EAAAA,IAAwB5O,EAAWyF,EAAcrF,EAASiM,EACpE,CAAC,MAAMjD,GAEJ,OADA7H,QAAQC,KAAK,6EACN,CACV,EASLqN,uBAAAA,CAAwBzO,GACpB,OAAOyB,EAAAA,GAAQnB,WAAWN,GAQ9BqN,cAAAA,GACI,OAAO5L,EAAAA,GAAQiN,oBAQnBC,aAAAA,CAAc3O,GACV,IAEI,OADSyB,EAAAA,GAAQnB,WAAWN,IACrB,CACV,CAAC,MAAOgJ,GACL,OAAO,CACV,EAIL,sBAAMkB,CAAiBkC,EAAgBlO,EAAkBkC,EAAmC+D,GACxF,IACI,OAAO/D,aAAkBqL,EAAAA,GAAkBrL,EAASqL,EAAAA,GAAgBnL,WAAmBF,EAC1F,CAAC,MAAO4I,GACL,IACI,MAAMM,EAAiCjM,KAAKiM,eAC5C,aAA+BA,EAAesF,kBAAkBxC,GAAQ,EAAMlO,EAAQiG,EACzF,CAAC,MAAO6E,GACL,MAAMnG,EAAY,sDAAsDmG,sGAC3E,CACJ,GAKT,SAAS0D,EAAqBJ,GAC1B,OAAOuC,EAAuBpJ,IAAI6G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOwC,EAAqBrJ,IAAI6G,GAAgBA,EAC5CzJ,EAAY,0BAA0ByJ,8FAC9C,CCjwCA,MAAM1H,EAAYmK,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAM7J,EAAgBa,EAAAA,GAAqBgJ,EAAS7J,cAEpD,IAAKA,EACD,MAAM,IAAIzI,MAAM,wBAA0BsS,EAAS7J,cAGvD,MAAO,CACHtB,KAAMmL,EAASnL,KACf6C,QAASsI,EAAStI,QAClBI,OAAQkI,EAASlI,OACjB2B,SAAUuG,EAASvG,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAagI,EAAQF,EAAAA,GAAS9H,eAC9BG,eAAgB6H,EAAQF,EAAAA,GAAS3H,kBACjCE,oBAAqB2H,EAAQF,EAAAA,GAASzH,uBACtCkB,YAAayG,EAAQF,EAAAA,GAASvG,eAC9BE,WAAYuG,EAAQF,EAAAA,GAASrG,cAC7BE,UAAWqG,EAAQF,EAAAA,GAASnG,aAC5BR,KAAM6G,EAAQF,EAAAA,GAAS3G,QACvBS,oBAAqBoG,EAAQF,EAAAA,GAASlG,uBACtCP,MAAO2G,EAAQF,EAAAA,GAASzG,SACxBZ,iBAAkBuH,EAAQF,EAAAA,GAASrH,oBACnCE,2BAA4BqH,EAAQF,EAAAA,GAASnH,8BAC7CE,gBAAiBmH,EAAQF,EAAAA,GAASjH,mBAClCE,0BAA2BiH,EAAQF,EAAAA,GAAS/G,6BAC5CE,2BAA4B+G,EAAQF,EAAAA,GAAS7G,8BAC7CY,cAAemG,EAAQF,EAAAA,GAASjG,iBAChCvC,OAAQ,SAAS3D,GACb,OAAIvF,KAAKoF,eAAeG,GACZvF,KAAauF,GAEd,IAAIhG,MAAM,QAAQgG,mBAK/BiM,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE1H,EAAmB,IAAI0H,IAAI,CAC7B,UACA,mBACA,oBAEExH,EAA6B,IAAIwH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEtH,EAAkB,IAAIsH,IAAI,CAC5B,SACA,kBACA,mBAEEpH,EAA4B,IAAIoH,IAAI,CACtC,mBACA,4BACA,2BAEElH,EAA6B,IAAIkH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAStM,EAAYgB,GAEjB,MADA1C,QAAQxD,MAAMkG,GACRA,CACV,6IC3GMuL,EAAAA,EAAAA,MAEN,MAAMC,EAAc,mCACdjG,EAAc,IAAIhF,EAAAA,gBAClBkL,EAAiB,IAAInG,EAAAA,eACvBkG,EACAjG,OACAe,GAGJf,EAAYtE,UAAS,GAErB,IAAIyK,EAA2B,GAY/BlT,eAAe4O,EACXuE,EACAC,EACA7E,EACA7M,EACAoN,GAAiB,GAEjBhK,QAAQ4I,IAAI,6CACZ,MAAM2F,EAAYC,YAAYC,MAE9B,IAEI,MAAM5P,EAAUsP,EAAeb,wBAAwBe,GACvD,GAAIxP,aAAmBpD,MACnB,KAAM,qCAEV,MAAMiT,EAAa7P,EAAQmD,KAC3B,IAAKnD,EAAQ8P,YAAYL,GACrB,KAAiB,WAAAI,+BAAwCJ,IAE7D,MAAMvL,EAAW,GAAG2L,KAAcJ,IAG5BpN,QAAgBiN,EAAejG,cAAcjH,kBAC/CoN,GAGJ,GAAInN,aAAmBzF,MACnB,KAAM,gCAGV,GAAI2S,IAAqBC,EAAc,CACnC,MAAMrK,QAA8BmK,EAAetD,eAC/CwD,EACAC,EACA7E,EACA/L,EAAAA,GAAWC,YAAYf,IAE3BuR,EAAelG,YAAYnE,UAAUf,EAAUiB,GAC/CoK,EAAmBC,CACtB,CAGD,MAAMO,EAAY,IAAIjM,EAAAA,sBAAsB,CACxCI,SAAUA,IAIRzH,QAAiB6S,EAAerE,IAClCuE,EACAC,EACA7E,EACAO,EACA9I,EACA0N,OACA5F,OACAA,EACAtL,EAAAA,GAAWC,YAAYf,IAI3BoD,QAAQ4I,IACJ,4CACI4F,YAAYC,MAAQF,QAG5B,MAAMzP,EAAUxD,EAASuT,aACnBpQ,EAAYnD,EAAS6R,eAC3B,IAAI2B,EAAkB,GAEtB,MAAM9K,EAAOiE,EAAYxD,QAAQ1B,GAEjC,GAAIiB,aAAgBvI,MAChB,KAAM,8BAGV,MAAMyI,EAAeF,EAAK,GAiB1B,OAfIvF,IACA4O,EAAAA,EAAAA,IACI5O,EACAyF,EACArF,EACA,SAEJiQ,EAAkBrQ,EAAUyB,WAC5BF,QAAQ4I,IAAI,oCAAsCnK,IAElDqQ,EAAkB,GAGtB9O,QAAQ4I,IAAI,gCAAgC9J,KAErC,CAAEA,QAASA,EAASL,UAAWqQ,EACzC,CAAC,MAAOtS,GAEL,OADAwD,QAAQxD,MAAMA,GACPA,EAAQA,EAAM0D,WAAa,eACrC,CACL,CAEAhF,eAAe6T,IAEX,OADmB,IAAIrR,EAAAA,IACLsR,WACtB,CAEA,MAAMC,EAAY,CAAEnF,MAAKiF,kBACzBG,EAAAA,EAAAA,IAAOD,6DCjIP,MAAME,EAAcC,OAAO,iBACrBC,EAAiBD,OAAO,oBACxBE,EAAeF,OAAO,wBACtBG,EAAYH,OAAO,qBACnBI,EAAcJ,OAAO,kBACrBK,EAAYC,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEC,EAAmB,IAAIjM,IAAI,CAC7B,CAAC,QA7CwB,CACzBkM,UAAYF,GAAQD,EAASC,IAAQA,EAAIP,GACzC,SAAAU,CAAUC,GACN,MAAM,MAAEC,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAf,EAAOY,EAAKC,GACL,CAACC,EAAO,CAACA,GACpB,EACA,WAAAE,CAAYC,GAER,OADAA,EAAKjT,QAiJFkT,EAhJSD,EAgJO,GAAIE,GAD/B,IAAkBA,CA9Id,IAoCA,CAAC,QA/BwB,CACzBT,UAAYxQ,GAAUqQ,EAASrQ,IAAUoQ,KAAepQ,EACxD,SAAAyQ,EAAU,MAAEzQ,IACR,IAAIkR,EAcJ,OAZIA,EADAlR,aAAiB3D,MACJ,CACT8U,SAAS,EACTnR,MAAO,CACHsD,QAAStD,EAAMsD,QACfE,KAAMxD,EAAMwD,KACZ4N,MAAOpR,EAAMoR,QAKR,CAAED,SAAS,EAAOnR,SAE5B,CAACkR,EAAY,GACxB,EACA,WAAAJ,CAAYI,GACR,GAAIA,EAAWC,QACX,MAAM/N,OAAOC,OAAO,IAAIhH,MAAM6U,EAAWlR,MAAMsD,SAAU4N,EAAWlR,OAExE,MAAMkR,EAAWlR,KACrB,MAoBJ,SAAS8P,EAAOY,EAAKW,EAAKC,WAAYC,EAAiB,CAAC,MACpDF,EAAGG,iBAAiB,WAAW,SAASC,EAASC,GAC7C,IAAKA,IAAOA,EAAGxN,KACX,OAEJ,IAhBR,SAAyBqN,EAAgBI,GACrC,IAAK,MAAMC,KAAiBL,EAAgB,CACxC,GAAII,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBR,EAAgBG,EAAGC,QAEpC,YADA/Q,QAAQC,KAAK,mBAAmB6Q,EAAGC,6BAGvC,MAAM,GAAE/O,EAAE,KAAEzD,EAAI,KAAE6S,GAAS5O,OAAOC,OAAO,CAAE2O,KAAM,IAAMN,EAAGxN,MACpD+N,GAAgBP,EAAGxN,KAAK+N,cAAgB,IAAIC,IAAIC,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASL,EAAKM,MAAM,GAAI,GAAGC,QAAO,CAAC7B,EAAK8B,IAAS9B,EAAI8B,IAAO9B,GAC5D+B,EAAWT,EAAKO,QAAO,CAAC7B,EAAK8B,IAAS9B,EAAI8B,IAAO9B,GACvD,OAAQvR,GACJ,IAAK,MAEGiT,EAAcK,EAElB,MACJ,IAAK,MAEGJ,EAAOL,EAAKM,OAAO,GAAG,IAAMH,EAAcT,EAAGxN,KAAKlE,OAClDoS,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcK,EAASC,MAAML,EAAQJ,GAEzC,MACJ,IAAK,YAGGG,EA6KxB,SAAe1B,GACX,OAAOtN,OAAOC,OAAOqN,EAAK,CAAE,CAACX,IAAc,GAC/C,CA/KsC4C,CADA,IAAIF,KAAYR,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAEtB,EAAK,MAAEC,GAAU,IAAIC,eAC7Bf,EAAOY,EAAKE,GACZwB,EAkKxB,SAAkB1B,EAAKkC,GAEnB,OADAC,EAAc9N,IAAI2L,EAAKkC,GAChBlC,CACX,CArKsCpE,CAASqE,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGyB,OAAcxI,EAElB,MACJ,QACI,OAEZ,CACA,MAAO5J,GACHoS,EAAc,CAAEpS,QAAO,CAACoQ,GAAc,EAC1C,CACA0C,QAAQC,QAAQX,GACXY,OAAOhT,IACD,CAAEA,QAAO,CAACoQ,GAAc,MAE9B6C,MAAMb,IACP,MAAOc,EAAWC,GAAiBC,EAAYhB,GAC/Cf,EAAGgC,YAAYjQ,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAG6P,GAAY,CAAEtQ,OAAOuQ,GACvD,YAAThU,IAEAkS,EAAGiC,oBAAoB,UAAW7B,GAClC8B,EAAclC,GACVlB,KAAaO,GAAiC,mBAAnBA,EAAIP,IAC/BO,EAAIP,KAEZ,IAEC6C,OAAO5V,IAER,MAAO8V,EAAWC,GAAiBC,EAAY,CAC3CpT,MAAO,IAAIwT,UAAU,+BACrB,CAACpD,GAAc,IAEnBiB,EAAGgC,YAAYjQ,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAG6P,GAAY,CAAEtQ,OAAOuQ,EAAc,GAE1F,IACI9B,EAAGvT,OACHuT,EAAGvT,OAEX,CAIA,SAASyV,EAAcE,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAAS5W,YAAY2G,IAChC,EAEQkQ,CAAcD,IACdA,EAASE,OACjB,CAIA,SAASC,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIxX,MAAM,6CAExB,CACA,SAASyX,EAAgBzC,GACrB,OAAO0C,EAAuB1C,EAAI,CAC9BlS,KAAM,YACP8T,MAAK,KACJM,EAAclC,EAAG,GAEzB,CACA,MAAM2C,EAAe,IAAIC,QACnBC,EAAkB,yBAA0B5C,YAC9C,IAAI6C,sBAAsB9C,IACtB,MAAM+C,GAAYJ,EAAajY,IAAIsV,IAAO,GAAK,EAC/C2C,EAAajP,IAAIsM,EAAI+C,GACJ,IAAbA,GACAN,EAAgBzC,EACpB,IAcR,SAASL,EAAYK,EAAIW,EAAO,GAAIf,EAAS,WAAc,GACvD,IAAIoD,GAAkB,EACtB,MAAM1B,EAAQ,IAAI2B,MAAMrD,EAAQ,CAC5B,GAAAlV,CAAIwY,EAAS/B,GAET,GADAoB,EAAqBS,GACjB7B,IAAStC,EACT,MAAO,MAXvB,SAAyByC,GACjBuB,GACAA,EAAgBM,WAAW7B,EAEnC,CAQoB8B,CAAgB9B,GAChBmB,EAAgBzC,GAChBgD,GAAkB,CAAI,EAG9B,GAAa,SAAT7B,EAAiB,CACjB,GAAoB,IAAhBR,EAAKjT,OACL,MAAO,CAAEkU,KAAM,IAAMN,GAEzB,MAAM+B,EAAIX,EAAuB1C,EAAI,CACjClS,KAAM,MACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,eACzBmS,KAAKd,GACR,OAAOuC,EAAEzB,KAAK2B,KAAKF,EACvB,CACA,OAAO1D,EAAYK,EAAI,IAAIW,EAAMQ,GACrC,EACA,GAAAzN,CAAIwP,EAAS/B,EAAMC,GACfmB,EAAqBS,GAGrB,MAAOrU,EAAOmT,GAAiBC,EAAYX,GAC3C,OAAOsB,EAAuB1C,EAAI,CAC9BlS,KAAM,MACN6S,KAAM,IAAIA,EAAMQ,GAAMN,KAAKyC,GAAMA,EAAE7T,aACnCd,SACDmT,GAAeF,KAAKd,EAC3B,EACA,KAAAO,CAAM6B,EAASM,EAAUC,GACrBlB,EAAqBS,GACrB,MAAMU,EAAO/C,EAAKA,EAAKjT,OAAS,GAChC,GAAIgW,IAAS9E,EACT,OAAO8D,EAAuB1C,EAAI,CAC9BlS,KAAM,aACP8T,KAAKd,GAGZ,GAAa,SAAT4C,EACA,OAAO/D,EAAYK,EAAIW,EAAKM,MAAM,GAAI,IAE1C,MAAOL,EAAckB,GAAiB6B,EAAiBF,GACvD,OAAOf,EAAuB1C,EAAI,CAC9BlS,KAAM,QACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,aACxBmR,gBACDkB,GAAeF,KAAKd,EAC3B,EACA,SAAA8C,CAAUV,EAASO,GACflB,EAAqBS,GACrB,MAAOpC,EAAckB,GAAiB6B,EAAiBF,GACvD,OAAOf,EAAuB1C,EAAI,CAC9BlS,KAAM,YACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,aACxBmR,gBACDkB,GAAeF,KAAKd,EAC3B,IAGJ,OA7EJ,SAAuBQ,EAAOtB,GAC1B,MAAM+C,GAAYJ,EAAajY,IAAIsV,IAAO,GAAK,EAC/C2C,EAAajP,IAAIsM,EAAI+C,GACjBF,GACAA,EAAgBgB,SAASvC,EAAOtB,EAAIsB,EAE5C,CAsEIwC,CAAcxC,EAAOtB,GACdsB,CACX,CAIA,SAASqC,EAAiB/C,GACtB,MAAMmD,EAAYnD,EAAaC,IAAIkB,GACnC,MAAO,CAACgC,EAAUlD,KAAKmD,GAAMA,EAAE,MALnBC,EAK+BF,EAAUlD,KAAKmD,GAAMA,EAAE,KAJ3DxX,MAAM0X,UAAUC,OAAO9C,MAAM,GAAI4C,KAD5C,IAAgBA,CAMhB,CACA,MAAMzC,EAAgB,IAAIoB,QAe1B,SAASb,EAAYpT,GACjB,IAAK,MAAOwD,EAAMiS,KAAYlF,EAC1B,GAAIkF,EAAQjF,UAAUxQ,GAAQ,CAC1B,MAAO0V,EAAiBvC,GAAiBsC,EAAQhF,UAAUzQ,GAC3D,MAAO,CACH,CACIb,KAAM,UACNqE,OACAxD,MAAO0V,GAEXvC,EAER,CAEJ,MAAO,CACH,CACIhU,KAAM,MACNa,SAEJ6S,EAAc9W,IAAIiE,IAAU,GAEpC,CACA,SAASmS,EAAcnS,GACnB,OAAQA,EAAMb,MACV,IAAK,UACD,OAAOoR,EAAiBxU,IAAIiE,EAAMwD,MAAMsN,YAAY9Q,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAAS+T,EAAuB1C,EAAIsE,EAAK/C,GACrC,OAAO,IAAIE,SAASC,IAChB,MAAMnQ,EAeH,IAAI/E,MAAM,GACZ+X,KAAK,GACL1D,KAAI,IAAMtF,KAAKiJ,MAAMjJ,KAAKkJ,SAAWC,OAAOC,kBAAkBlV,SAAS,MACvE+G,KAAK,KAjBNwJ,EAAGG,iBAAiB,WAAW,SAAS7R,EAAE+R,GACjCA,EAAGxN,MAASwN,EAAGxN,KAAKtB,IAAM8O,EAAGxN,KAAKtB,KAAOA,IAG9CyO,EAAGiC,oBAAoB,UAAW3T,GAClCoT,EAAQrB,EAAGxN,MACf,IACImN,EAAGvT,OACHuT,EAAGvT,QAEPuT,EAAGgC,YAAYjQ,OAAOC,OAAO,CAAET,MAAM+S,GAAM/C,EAAU,GAE7D,IC/UIqD,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBvM,IAAjBwM,EACH,OAAOA,EAAaC,QAGrB,IAAIC,EAASL,EAAyBE,GAAY,CAGjDE,QAAS,CAAC,GAOX,OAHAE,EAAoBJ,GAAUG,EAAQA,EAAOD,QAASH,GAG/CI,EAAOD,OACf,CAGAH,EAAoBM,EAAID,EAGxBL,EAAoBO,EAAI,KAGvB,IAAIC,EAAsBR,EAAoBS,OAAE/M,EAAW,CAAC,MAAM,IAAOsM,EAAoB,QAE7F,OADAQ,EAAsBR,EAAoBS,EAAED,EAClB,EVjCvBlb,EAAkC,mBAAXwU,OAAwBA,OAAO,kBAAoB,qBAC1EvU,EAAmC,mBAAXuU,OAAwBA,OAAO,mBAAqB,sBAC5EtU,EAAiC,mBAAXsU,OAAwBA,OAAO,iBAAmB,oBACxErU,EAAgBib,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGrC,MAC1BkC,EAAME,SAASC,GAAQA,EAAGrC,IAAMqC,EAAGrC,IAAMqC,MAC1C,EAyBDb,EAAoBc,EAAI,CAACV,EAAQnT,EAAM8T,KACtC,IAAIL,EACJK,KAAcL,EAAQ,IAAIC,GAAK,GAC/B,IAEIK,EACAC,EACAC,EAJAC,EAAY,IAAIzI,IAChByH,EAAUC,EAAOD,QAIjBiB,EAAU,IAAIxE,SAAQ,CAACC,EAASwE,KACnCH,EAASG,EACTJ,EAAepE,CAAO,IAEvBuE,EAAQ7b,GAAkB4a,EAC1BiB,EAAQ9b,GAAkBub,IAAQH,GAASG,EAAGH,GAAQS,EAAUP,QAAQC,GAAKO,EAAe,OAAEb,SAC9FH,EAAOD,QAAUiB,EACjBnU,GAAMqU,IAEL,IAAIT,EADJG,EAvCa,CAACM,GAAUA,EAAKtF,KAAKuF,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAIjc,GAAgB,OAAOic,EAC9B,GAAGA,EAAIxE,KAAM,CACZ,IAAI2D,EAAQ,GACZA,EAAMC,EAAI,EACVY,EAAIxE,MAAMyB,IACThE,EAAIjV,GAAkBiZ,EACtB/Y,EAAaib,EAAM,IAChBnO,IACHiI,EAAIhV,GAAgB+M,EACpB9M,EAAaib,EAAM,IAEpB,IAAIlG,EAAM,CAAC,EAEX,OADAA,EAAIlV,GAAkBub,GAAQA,EAAGH,GAC1BlG,CACR,CACD,CACA,IAAIgH,EAAM,CAAC,EAGX,OAFAA,EAAIlc,GAAiBib,MACrBiB,EAAIjc,GAAkBgc,EACfC,CAAG,IAkBKC,CAASH,GAEvB,IAAII,EAAY,IAAOV,EAAYhF,KAAK2E,IACvC,GAAGA,EAAEnb,GAAe,MAAMmb,EAAEnb,GAC5B,OAAOmb,EAAEpb,EAAe,IAErB6b,EAAU,IAAIxE,SAASC,KAC1BgE,EAAK,IAAOhE,EAAQ6E,IACjBlD,EAAI,EACP,IAAImD,EAAWC,GAAOA,IAAMlB,IAAUS,EAAUnS,IAAI4S,KAAOT,EAAUU,IAAID,GAAIA,IAAMA,EAAEjB,IAAME,EAAGrC,IAAKoD,EAAErX,KAAKsW,KAC1GG,EAAYhF,KAAKuF,GAASA,EAAIjc,GAAeqc,IAAU,IAExD,OAAOd,EAAGrC,EAAI4C,EAAUM,GAAW,IAChCI,IAAUA,EAAMZ,EAAOE,EAAQ5b,GAAgBsc,GAAOb,EAAad,GAAW1a,EAAaib,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlCjb,EAAW,GACfsa,EAAoBS,EAAI,CAACsB,EAAQC,EAAUnB,EAAIoB,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASvZ,EAAI,EAAGA,EAAIlD,EAASmD,OAAQD,IAAK,CAGzC,IAFA,IAAKoZ,EAAUnB,EAAIoB,GAAYvc,EAASkD,GACpCwZ,GAAY,EACPrZ,EAAI,EAAGA,EAAIiZ,EAASnZ,OAAQE,MACpB,EAAXkZ,GAAsBC,GAAgBD,IAAa/U,OAAOwB,KAAKsR,EAAoBS,GAAG4B,OAAOlW,GAAS6T,EAAoBS,EAAEtU,GAAK6V,EAASjZ,MAC9IiZ,EAASM,OAAOvZ,IAAK,IAErBqZ,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACb1c,EAAS4c,OAAO1Z,IAAK,GACrB,IAAI4V,EAAIqC,SACEnN,IAAN8K,IAAiBuD,EAASvD,EAC/B,CACD,CACA,OAAOuD,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIrZ,EAAIlD,EAASmD,OAAQD,EAAI,GAAKlD,EAASkD,EAAI,GAAG,GAAKqZ,EAAUrZ,IAAKlD,EAASkD,GAAKlD,EAASkD,EAAI,GACrGlD,EAASkD,GAAK,CAACoZ,EAAUnB,EAAIoB,EAqBjB,EUzBdjC,EAAoBW,EAAI,CAACR,EAASoC,KACjC,IAAI,IAAIpW,KAAOoW,EACXvC,EAAoBwC,EAAED,EAAYpW,KAAS6T,EAAoBwC,EAAErC,EAAShU,IAC5Ee,OAAOuV,eAAetC,EAAShU,EAAK,CAAEuW,YAAY,EAAM7c,IAAK0c,EAAWpW,IAE1E,ECND6T,EAAoB2C,EAAI,CAAC,EAGzB3C,EAAoBzN,EAAKqQ,GACjBhG,QAAQiG,IAAI3V,OAAOwB,KAAKsR,EAAoB2C,GAAGtG,QAAO,CAACyG,EAAU3W,KACvE6T,EAAoB2C,EAAExW,GAAKyW,EAASE,GAC7BA,IACL,KCNJ9C,EAAoB+C,EAAKH,GAEZA,EAAU,aCHvB5C,EAAoBgD,EAAI,WACvB,GAA0B,iBAAf5H,WAAyB,OAAOA,WAC3C,IACC,OAAOxU,MAAQ,IAAIqc,SAAS,cAAb,EAChB,CAAE,MAAO1Q,GACR,GAAsB,iBAAX2Q,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBlD,EAAoBwC,EAAI,CAAChI,EAAK8B,IAAUpP,OAAOmS,UAAUrT,eAAemX,KAAK3I,EAAK8B,SCAlF,IAAI8G,EACApD,EAAoBgD,EAAEK,gBAAeD,EAAYpD,EAAoBgD,EAAEM,SAAW,IACtF,IAAIC,EAAWvD,EAAoBgD,EAAEO,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQ7a,OAEV,IADA,IAAID,EAAI8a,EAAQ7a,OAAS,EAClBD,GAAK,IAAMwa,GAAWA,EAAYM,EAAQ9a,KAAK6a,GAExD,CAID,IAAKL,EAAW,MAAM,IAAIjd,MAAM,yDAChCid,EAAYA,EAAUnY,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpF+U,EAAoBvB,EAAI2E,YClBxBpD,EAAoB4D,EAAIC,KAAKP,SAAW,GAIxC,IAAIQ,EAAkB,CACrB,IAAK,GAgBN9D,EAAoB2C,EAAE/Z,EAAI,CAACga,EAASE,KAE/BgB,EAAgBlB,IAElBS,cAAcrD,EAAoBvB,EAAIuB,EAAoB+C,EAAEH,GAE9D,EAGD,IAAImB,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBxZ,KAAKmU,KAAKqF,GAC9DA,EAAmBxZ,KAvBCyD,IACnB,IAAKgU,EAAUiC,EAAaC,GAAWlW,EACvC,IAAI,IAAIiS,KAAYgE,EAChBjE,EAAoBwC,EAAEyB,EAAahE,KACrCD,EAAoBM,EAAEL,GAAYgE,EAAYhE,IAIhD,IADGiE,GAASA,EAAQlE,GACdgC,EAASnZ,QACdib,EAAgB9B,EAASmC,OAAS,EACnCH,EAA2BhW,EAAK,MfnB7BrI,EAAOqa,EAAoBO,EAC/BP,EAAoBO,EAAI,IAChBP,EAAoBzN,EAAE,KAAKwK,KAAKpX,GgBDdqa,EAAoBO","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/../src/worker.ts","webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn __webpack_require__.e(933).then(next);\n};","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","import {initThreadPool, ProgramManager, PrivateKey, verifyFunctionExecution, FunctionKeyPair} from \"./index\";\nimport { AleoKeyProvider, AleoKeyProviderParams} from \"./function-key-provider\";\nimport { expose } from \"comlink\";\n\nawait initThreadPool();\n\nconst defaultHost = \"https://api.explorer.aleo.org/v1\";\nconst keyProvider = new AleoKeyProvider();\nconst programManager = new ProgramManager(\n defaultHost,\n keyProvider,\n undefined\n);\n\nkeyProvider.useCache(true);\n\nlet lastLocalProgram: string = \"\";\n\nexport interface WorkerAPI {\n run: (\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string\n ) => Promise<{ outputs: any; execution: string } | string>;\n\n getPrivateKey: () => Promise;\n}\nasync function run(\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string,\n proveExecution = false\n) {\n console.log(\"Web worker: Executing function locally...\");\n const startTime = performance.now();\n\n try {\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n if (program instanceof Error) {\n throw \"Error creating program from source\";\n }\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = await programManager.networkClient.getProgramImports(\n localProgram\n );\n\n if (imports instanceof Error) {\n throw \"Error getting program imports\";\n }\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(\n localProgram,\n aleoFunction,\n inputs,\n PrivateKey.from_string(privateKey)\n );\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new AleoKeyProviderParams({\n cacheKey: cacheKey,\n });\n\n // Execute the function locally\n const response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n proveExecution,\n imports,\n keyParams,\n undefined,\n undefined,\n PrivateKey.from_string(privateKey),\n );\n\n // Return the outputs to the main thread\n console.log(\n `Web worker: Local execution completed in ${\n performance.now() - startTime\n } ms`\n );\n const outputs = response.getOutputs();\n const execution = response.getExecution();\n let executionString = \"\";\n\n const keys = keyProvider.getKeys(cacheKey);\n\n if (keys instanceof Error) {\n throw \"Could not get verifying key\";\n }\n\n const verifyingKey = keys[1];\n\n if (execution) {\n verifyFunctionExecution(\n execution,\n verifyingKey,\n program,\n \"hello\"\n );\n executionString = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n executionString = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n\n return { outputs: outputs, execution: executionString };\n } catch (error) {\n console.error(error);\n return error ? error.toString() : \"Unknown error\";\n }\n}\n\nasync function getPrivateKey() {\n const privateKey = new PrivateKey();\n return privateKey.to_string();\n}\n\nconst workerAPI = { run, getPrivateKey };\nexpose(workerAPI);\n","/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [933], () => (__webpack_require__(9669)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && !scriptUrl) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t530: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","async","get","url","options","response","fetch","ok","Error","status","post","method","AleoNetworkClient","host","headers","account","constructor","this","setAccount","getAccount","setHost","fetchData","json","error","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","RecordCiphertext","fromString","value","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","console","warn","toString","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","message","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","undefined","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initThreadPool","defaultHost","programManager","lastLocalProgram","localProgram","aleoFunction","startTime","performance","now","program_id","hasFunction","keyParams","getOutputs","executionString","getPrivateKey","to_string","workerAPI","expose","proxyMarker","Symbol","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","val","transferHandlers","canHandle","serialize","obj","port1","port2","MessageChannel","deserialize","port","createProxy","target","serialized","isError","stack","ep","globalThis","allowedOrigins","addEventListener","callback","ev","origin","allowedOrigin","RegExp","test","isAllowedOrigin","path","argumentList","map","fromWireValue","returnValue","parent","slice","reduce","prop","rawValue","apply","proxy","transfers","transferCache","Promise","resolve","catch","then","wireValue","transferables","toWireValue","postMessage","removeEventListener","closeEndPoint","TypeError","endpoint","isMessagePort","close","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","FinalizationRegistry","newCount","isProxyReleased","Proxy","_target","unregister","unregisterProxy","r","p","bind","_thisArg","rawArgumentList","last","processArguments","construct","register","registerProxy","processed","v","arr","prototype","concat","handler","serializedValue","msg","fill","floor","random","Number","MAX_SAFE_INTEGER","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","queue","d","forEach","fn","a","hasAwait","currentDeps","outerResolve","reject","depQueues","promise","rej","deps","dep","ret","wrapDeps","getResult","fnQueue","q","add","err","result","chunkIds","priority","notFulfilled","Infinity","fulfilled","every","splice","definition","o","defineProperty","enumerable","f","chunkId","all","promises","u","g","Function","window","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file +{"version":3,"file":"530.bundle.js","mappings":";UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,+KCAGC,eAAeC,EAAIC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,sBAAwBN,GAG9D,OAAOE,CACX,CAGOJ,eAAeS,EAAKP,EAAmBC,GAC1CA,EAAQO,OAAS,OAEjB,MAAMN,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIC,MAAMH,EAASI,OAAS,uBAAyBN,GAG/D,OAAOE,CACX,CCUA,MAAMO,EACJC,KACAC,QACAC,QAEAC,WAAAA,CAAYH,EAAcT,GACxBa,KAAKJ,KAAOA,EAAO,WAEfT,GAAWA,EAAQU,QACrBG,KAAKH,QAAUV,EAAQU,QAGvBG,KAAKH,QAAU,CAEb,qBAAsB,UAa5BI,UAAAA,CAAWH,GACTE,KAAKF,QAAUA,EASjBI,UAAAA,GACE,OAAOF,KAAKF,QASdK,OAAAA,CAAQP,GACNI,KAAKJ,KAAOA,EAAO,WAGrB,eAAMQ,CACFlB,EAAM,KAER,IACA,MAAME,QAAiBH,EAAIe,KAAKJ,KAAOV,EAAK,CAC1CW,QAASG,KAAKH,UAGhB,aAAaT,EAASiB,OACpB,MAAOC,GACP,MAAM,IAAIf,MAAM,yBA2BpB,wBAAMgB,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIjB,MAAM,mDAIlB,MAAMuB,EAAU,IAAIC,MACpB,IAAIC,EACAC,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfZ,EAA4B,CACrC,QAA4B,IAAjBV,KAAKF,QACd,MAAM,IAAIP,MAAM,oGAEhB2B,EAAqBlB,KAAKF,QAAQyB,iBAGpC,IACEL,EAAqBR,aAAsBc,EAAAA,GAAad,EAAac,EAAAA,GAAWC,YAAYf,GAC5F,MAAOJ,GACP,MAAM,IAAIf,MAAM,uCAGpB,MAAMmC,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoB5B,KAAK6B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAIrC,MAAM,uCAFhB4B,EAAeS,EAIjB,MAAOtB,GACP,MAAM,IAAIf,MAAM,uCAWlB,GANE0B,EADuB,iBAAdR,GAA0BA,GAAaU,EAC1CV,EAEAU,EAIJX,EAAcS,EAChB,MAAM,IAAI1B,MAAM,0DAIlB,KAAO0B,EAAMT,GAAa,CACxBQ,EAAQC,EAAM,GACVD,EAAQR,IACVQ,EAAQR,GAEV,IAEE,MAAMsB,QAAe9B,KAAK+B,cAAcf,EAAOC,GAE/C,GADAA,EAAMD,IACAc,aAAkBvC,OAEtB,IAAK,IAAIyC,EAAI,EAAGA,EAAIF,EAAOG,OAAQD,IAAK,CACtC,MACME,EADQJ,EAAOE,GACME,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaD,OAAQE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqBC,KAAmB,CAC1C,MAAMC,EAAcF,EAAqBE,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAYP,OAAQQ,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAWE,QAAQX,OAAQY,IAAK,CAClD,MAAMC,EAASJ,EAAWE,QAAQC,GAClC,GAAoB,WAAhBC,EAAOT,KACT,IAEE,MAAMU,EAASC,EAAAA,GAAiBC,WAAWH,EAAOI,OAElD,GAAIH,EAAOI,QAAQzB,GAAU,CAE3B,MAAM0B,EAAkBL,EAAOM,QAAQ3B,GAGjC4B,EAAQF,EAAgBE,QAC9B,GAAIzC,EAAO0C,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBvC,EAAoB,eAAgB,WAE5F,UACQlB,KAAK0D,gBAAgBF,GAC3B,MAAOlD,GAEP,IAAKK,IACHG,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQsB,OAAS,EAAG,CAC3D,IAAI4B,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiBjD,EAAQkD,GAAgB,CAIzD,GAHAA,GAAiB,EACjB/C,EAAQ6C,KAAKP,GAEkB,iBAApBxC,IACTS,GAAoB+B,EAAgBQ,eAEhCvC,GAAoBC,OAAOV,IAC7B,OAAOE,EAGX,GAAIA,EAAQmB,QAAUtB,EAAQsB,OAC5B,OAAOnB,MAMnB,MAAOR,GAAQ,OAYrC,MAAOA,GAKP,GAHAwD,QAAQC,KAAK,mCAAqC/C,EAAMgD,WAAa,IAAM/C,EAAI+C,YAC/EF,QAAQC,KAAK,UAAWzD,GACxBc,GAAY,EACRA,EAAW,GAEb,OADA0C,QAAQC,KAAK,0EACNjD,GAIb,OAAOA,EAUT,cAAMmD,CAASC,GACb,IAEE,aADoBlE,KAAKI,UAAiB,UAAY8D,GAEtD,MAAO5D,GACP,MAAM,IAAIf,MAAM,0BAYpB,mBAAMwC,CAAcf,EAAeC,GACjC,IACE,aAAajB,KAAKI,UAAwB,iBAAmBY,EAAQ,QAAUC,GAC/E,MAAOX,GAEP,MAAM,IAAIf,MADW,iCAAmCyB,EAAQ,QAAUC,EAAM,MAWpF,0CAAMkD,CAAqCxB,GACrCA,aAAmByB,EAAAA,KACrBzB,EAAUA,EAAQqB,YAEpB,IAEE,aADiBhE,KAAKI,UAAkB,kCAAoCuC,IAClE0B,QAAQ,IAAM,IACxB,MAAO/D,GACP,MAAM,IAAIf,MAAM,uDAUpB,wCAAM+E,CAAmC3B,GACvC,IACE,MAAM4B,QAA+BvE,KAAKmE,qCAAqCxB,GAC/E,aAA+B3C,KAAKwE,eAAeD,GACnD,MAAOjE,GACP,MAAM,IAAIf,MAAM,uDAUpB,oBAAMkF,GACJ,IACE,aAAazE,KAAKI,UAAiB,iBACnC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCASpB,wBAAMmF,GACJ,IACE,aAAa1E,KAAKI,UAAkB,qBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,iCAUpB,qBAAMsC,GACJ,IACE,aAAa7B,KAAKI,UAAkB,kBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,kCAepB,gBAAMoF,CAAWC,GACf,IACE,aAAa5E,KAAKI,UAAkB,YAAcwE,GAClD,MAAOtE,GACP,MAAM,IAAIf,MAAM,2BAqBpB,sBAAMsF,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnB,WAAW6B,GAC1B,MAAOxE,GACP,IACE,OAAO8D,EAAAA,GAAQnB,iBAA0BjD,KAAK2E,WAAWG,IACzD,MAAOxE,GACP,MAAM,IAAIf,MAAM,GAAGuF,oDA8BzB,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIlD,EAAI,EAAGA,EAAIiD,EAAWhD,OAAQD,IAAK,CAC1C,MAAMmD,EAAYF,EAAWjD,GAC7B,IAAKgD,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8BrF,KAAK2E,WAAWQ,GAC9CG,QAAsCtF,KAAK+E,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,GAGzB,OAAOL,EACP,MAAO1E,GACP,MAAMkF,EAAY,mCAAqClF,IAe3D,2BAAMmF,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+B9E,KAAK6E,iBAAiBC,IACxFI,aACf,MAAO5E,GACP,MAAM,IAAIf,MAAM,8CAAgDe,IAapE,4BAAMoF,CAAuBd,GAC3B,IACE,aAAa5E,KAAKI,UAAyB,YAAcwE,EAAY,aACrE,MAAOtE,GACP,MAAM,IAAIf,MAAM,6FAkBpB,4BAAMoG,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAavF,KAAKI,UAAkB,YAAcwE,EAAY,YAAcgB,EAAc,IAAML,GAChG,MAAOjF,GACP,MAAM,IAAIf,MAAM,oFAUpB,kBAAMsG,GACJ,IACE,aAAa7F,KAAKI,UAAkB,qBACpC,MAAOE,GACP,MAAM,IAAIf,MAAM,mCAWpB,oBAAMiF,CAAesB,GACnB,IACA,aAAa9F,KAAKI,UAA4B,gBAAkB0F,GAC9D,MAAOxF,GACP,MAAM,IAAIf,MAAM,gCAWpB,qBAAMwG,CAAgB7B,GACpB,IACA,aAAalE,KAAKI,UAAmC,UAAY8D,EAAOF,WAAa,iBACnF,MAAO1D,GACP,MAAM,IAAIf,MAAM,iCAUpB,8BAAMyG,GACJ,IACE,aAAahG,KAAKI,UAAmC,4BACrD,MAAOE,GACP,MAAM,IAAIf,MAAM,8CAWpB,qBAAMmE,CAAgBuC,GACpB,IACE,aAAajG,KAAKI,UAAkB,sBAAwB6F,GAC5D,MAAO3F,GACP,MAAM,IAAIf,MAAM,kCAUpB,uBAAM2G,CAAkB5D,GACtB,MAAM6D,EAAqB7D,aAAuB8D,EAAAA,GAAc9D,EAAY0B,WAAa1B,EACzF,IACE,MAAMlD,QAAiBK,EAAKO,KAAKJ,KAAO,yBAA0B,CAChEyG,KAAMF,EACNtG,QAASyG,OAAOC,OAAO,CAAC,EAAGvG,KAAKH,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaT,EAASiB,OAEtB,MAAOC,GACP,MAAM,IAAIf,MAAM,qDAAsDe,EAAgBkG,YAExF,MAAOlG,GACP,MAAM,IAAIf,MAAM,oDAAqDe,EAAgBkG,aChnB3F,MAAMC,EACFC,KACAC,UACAC,YACAC,SAUA9G,WAAAA,CAAY+G,GACR9G,KAAK2G,UAAYG,EAAOH,UACxB3G,KAAK4G,YAAcE,EAAOF,YAC1B5G,KAAK6G,SAAWC,EAAOD,SACvB7G,KAAK0G,KAAOI,EAAOJ,MAyK3B,MAAMK,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFjI,EAAM,KAEN,IACA,MAAME,QAAiBH,EAAIC,GACrBkI,QAAahI,EAASiI,cAC5B,OAAO,IAAIC,WAAWF,GACpB,MAAO9G,GACL,MAAM,IAAIf,MAAM,uBAAyBe,IAIjDP,WAAAA,GACIC,KAAKkH,QAAUK,EACfvH,KAAKgH,MAAQ,IAAIQ,IACjBxH,KAAKiH,aAAc,EAQvBQ,QAAAA,CAASA,GACLzH,KAAKiH,YAAcQ,EAMvBC,UAAAA,GACI1H,KAAKgH,MAAMW,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC9H,KAAKgH,MAAMiB,IAAIJ,EAAO,CAACE,EAAWG,UAAWF,EAAaE,YAS9DC,YAAAA,CAAaN,GACT,OAAO7H,KAAKgH,MAAMoB,IAAIP,GAS1BQ,UAAAA,CAAWR,GACP,OAAO7H,KAAKgH,MAAMsB,OAAOT,GAS7BU,OAAAA,CAAQV,GAEJ,GADA/D,QAAQ0E,MAAM,2CAA2CX,KACrD7H,KAAKgH,MAAMoB,IAAIP,GAAQ,CACvB,MAAOY,EAAiBC,GAAoC1I,KAAKgH,MAAM/H,IAAI4I,GAC3E,MAAO,CAACc,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,IAEtE,OAAO,IAAInJ,MAAM,2BAwBzB,kBAAMuJ,CAAahC,GACf,GAAIA,EAAQ,CACR,IAAIiC,EACAC,EACAnC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIvB,EAAM0D,EAAqBC,OAAOpC,EAAa,MACnD,KAAMvB,aAAehG,OACjB,OAAOS,KAAKmJ,iBAAiB5D,GAgBrC,GAZI,cAAeuB,GAAwC,iBAAvBA,EAAkB,YAClDiC,EAAYjC,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDkC,EAAclC,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5BiC,GAAaC,EACb,aAAahJ,KAAKoJ,gBAAgBL,EAAWC,EAAanC,GAG9D,GAAIA,EACA,OAAO7G,KAAKuI,QAAQ1B,GAG5B,MAAMtH,MAAM,oGA4BhB,qBAAM6J,CAAgBL,EAAmBC,EAAqBnC,GAC1D,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,MAAO,CAACyF,EAAAA,GAAWC,UAAU1F,EAAM,IAAK2F,EAAAA,GAAaD,UAAU1F,EAAM,KAClE,CACHY,QAAQ0E,MAAM,kCAAoCO,GAClD,MAAMhB,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAC1EjF,QAAQ0E,MAAM,2BAA6BQ,GAC3C,MAAMhB,QAAoChI,KAAKqJ,gBAAgBL,GAE/D,OADAhJ,KAAKgH,MAAMiB,IAAIpB,EAAU,CAACkB,EAAWG,UAAWF,EAAaE,YACtD,CAACH,EAAYC,IAGvB,CAED,MAAMD,EAAyBY,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAE1E,MAAO,CAAChB,QADkC/H,KAAKqJ,gBAAgBL,KAGrE,MAAO1I,GACL,MAAM,IAAIf,MAAgB,UAAAe,kDAAsDyI,SAAiBC,OAYzG,qBAAMM,CAAgBP,EAAmBlC,GACrC,IAEI,GAAI7G,KAAKiH,YAAa,CACbJ,IACDA,EAAWkC,GAEf,MAAM7F,EAAQlD,KAAKgH,MAAM/H,IAAI4H,GAC7B,QAAqB,IAAV3D,EACP,OAAOyF,EAAAA,GAAWC,UAAU1F,EAAM,IAElCY,QAAQ0E,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAM9E,OAD+BJ,EAAAA,GAAWC,gBAAgB5I,KAAKmH,WAAW4B,IAGhF,MAAOzI,GACL,MAAM,IAAIf,MAAM,UAAUe,oCAAwCyI,MAI1E,sBAAMI,CAAiB5D,GACnB,IACI,GAAKvF,KAAKgH,MAAMoB,IAAI7C,EAAIgE,UAAavJ,KAAKiH,YAOnC,CACH,MAAMuC,EAAyBxJ,KAAKgH,MAAM/H,IAAIsG,EAAIgE,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,KATtB,CACnD,MAAMC,EAAgBlE,EAAIyC,eACpB0B,QAAgC1J,KAAKsJ,gBAAgB/D,EAAIoE,OAAQpE,EAAIgE,SAI3E,OAHIvJ,KAAKiH,aACLjH,KAAKgH,MAAMiB,IAAIgB,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,IAK3B,MAAOnJ,GACL,MAAM,IAAIf,MAAM,sCAAsCe,MAI9D,oBAAMuJ,GACF,OAAO7J,KAAKmJ,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO9J,KAAKmJ,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOhK,KAAKmJ,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanK,KAAKmJ,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanK,KAAKmJ,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanK,KAAKmJ,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanK,KAAKmJ,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAItL,MAAM,2BASxB,cAAMuL,GACF,aAAa9K,KAAKmJ,iBAAiBF,EAAqB8B,MAQ5D,eAAMC,GACF,aAAahL,KAAKmJ,iBAAiBF,EAAqBgC,OAQ5D,oBAAMC,GACF,aAAalL,KAAKmJ,iBAAiBF,EAAqBkC,aAQ5D,mBAAMC,GACF,aAAapL,KAAKmJ,iBAAiBF,EAAqBoC,YAS5D,qBAAMhC,CAAgBzC,GAClB,OAAQA,GACJ,KAAKqC,EAAqBW,YAAY0B,SAClC,OAAOrC,EAAqBW,YAAY5B,eAC5C,KAAKiB,EAAqBc,eAAeuB,SACrC,OAAOrC,EAAqBc,eAAe/B,eAC/C,KAAKiB,EAAqBgB,oBAAoBqB,SAC1C,OAAOrC,EAAqBgB,oBAAoBjC,eACpD,KAAKiB,EAAqBkC,YAAYG,SAClC,OAAOrC,EAAqBkC,YAAYnD,eAC5C,KAAKiB,EAAqBoC,WAAWC,SACjC,OAAOrC,EAAqBoC,WAAWrD,eAC3C,KAAKiB,EAAqBsC,UAAUD,SAChC,OAAOrC,EAAqBsC,UAAUvD,eAC1C,KAAKiB,EAAqB8B,KAAKO,SAC3B,OAAOrC,EAAqB8B,KAAK/C,eACrC,KAAKiB,EAAqBuC,oBAAoBF,SAC1C,OAAOrC,EAAqBuC,oBAAoBxD,eACpD,KAAKiB,EAAqBgC,MAAMK,SAC5B,OAAOrC,EAAqBgC,MAAMjD,eACtC,KAAKiB,EAAqBoB,iBAAiBiB,SACvC,OAAOrC,EAAqBoB,iBAAiBrC,eACjD,KAAKiB,EAAqBsB,2BAA2Be,SACjD,OAAOrC,EAAqBsB,2BAA2BvC,eAC3D,KAAKiB,EAAqBwB,gBAAgBa,SACtC,OAAOrC,EAAqBwB,gBAAgBzC,eAChD,KAAKiB,EAAqB0B,0BAA0BW,SAChD,OAAOrC,EAAqB0B,0BAA0B3C,eAC1D,KAAKiB,EAAqB4B,2BAA2BS,SACjD,OAAOrC,EAAqB4B,2BAA2B7C,eAC3D,KAAKiB,EAAqBwC,cAAcH,SACpC,OAAOrC,EAAqBwC,cAAczD,eAC9C,QACI,IAEI,MAAM5I,QAAiBH,EAAI2H,GACrB8E,QAAatM,EAASsM,OAC5B,OAAqB7C,EAAAA,GAAa5F,WAAWyI,GAC/C,MAAOC,GAEL,IACA,OAAqB9C,EAAAA,GAAaD,gBAAgB5I,KAAKmH,WAAWP,IAChE,MAAOgF,GACL,OAAO,IAAIrM,MAAM,iCAAmCqM,MAMxEC,gBAAAA,GACI,OAAO7L,KAAKmJ,iBAAiBF,EAAqBwC,gBC/hB1D,MAAMK,EACFhM,QACAiM,YACAnM,KACAoM,cACAC,eAQAlM,WAAAA,CAAYH,EAA2BmM,EAA+CE,GAClFjM,KAAKJ,KAAOA,GAAc,mCAC1BI,KAAKgM,cAAgB,IAAIrM,EAAkBK,KAAKJ,MAEhDI,KAAK+L,YAAcA,GAA4B,IAAIhF,EACnD/G,KAAKiM,eAAiBA,EAQ1BhM,UAAAA,CAAWH,GACPE,KAAKF,QAAUA,EAQnBoM,cAAAA,CAAeH,GACX/L,KAAK+L,YAAcA,EAQvB5L,OAAAA,CAAQP,GACJI,KAAKJ,KAAOA,EACZI,KAAKgM,cAAc7L,QAAQP,GAQ/BuM,iBAAAA,CAAkBF,GACdjM,KAAKiM,eAAiBA,EAkC1B,YAAMG,CACFzJ,EACA0J,EACAC,EACAC,EACAC,EACA9L,GAGA,IACI,MAAM+L,EAAgBrI,EAAAA,GAAQnB,WAAWN,GACzC,IAAI0C,EACJ,IACIA,QAAsBrF,KAAKgM,cAAcrH,WAAW8H,EAAc3G,MACpE,MAAO6F,GAEL7H,QAAQ4I,IAAe,WAAAD,EAAc3G,oDAEzC,GAA4B,iBAAjBT,EACP,KAAO,WAAWoH,EAAc3G,iEAEtC,MAAO6F,GACL,MAAMnG,EAAY,6BAA6BmG,KAInD,IAiBIgB,EAjBAC,EAAuBlM,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD8M,EAAuB5M,KAAKF,QAAQY,mBAGJ,IAAzBkM,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAK5E,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC5H,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAI3H,EACJ,IACIA,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACvD,MAAOgJ,GACL,MAAMnG,EAAY,qDAAqDmG,0GAI3E,MAAMsB,QAAWC,EAAAA,EAAmBC,2BAA2BP,EAAsBjK,EAAS0J,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+H,EAAeC,GACjJ,aAAahN,KAAKgM,cAAc9F,kBAAkB+G,GA8BtD,+BAAMG,CAA0BjO,GAE5B,MAAM,YACFkO,EAAW,aACXC,EAAY,IACZjB,EAAG,WACHC,EAAU,OACViB,EAAM,mBACNhB,EAAkB,gBAClBiB,EAAe,WACf9M,EAAU,aACV+M,GACAtO,EAEJ,IAAIqN,EAAYrN,EAAQqN,UACpBzE,EAAa5I,EAAQ4I,WACrBC,EAAe7I,EAAQ6I,aACvBrF,EAAUxD,EAAQwD,QAClBqC,EAAU7F,EAAQ6F,QAGtB,QAAgB8H,IAAZnK,EACA,IACIA,QAAyB3C,KAAKgM,cAAcrH,WAAW0I,GACzD,MAAO1B,GACL,MAAMnG,EAA6B,iBAAA6H,yBAAmC1B,2GAEnEhJ,aAAmByB,EAAAA,KAC1BzB,EAAUA,EAAQqB,YAItB,IAiBI2I,EAjBAe,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IACIlB,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAK5E,IACIgB,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC5H,MAAOO,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,EAGzC,IAAK5E,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,GACpF,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,6CAMtE,GADwBvH,EAAAA,GAAQnB,WAAWN,GAASuC,aAAajD,OAC3C,IAAM+C,EACxB,IACIA,QAAgChF,KAAKgM,cAAcjH,kBAAkBsI,GACvE,MAAO1B,GACL,MAAMnG,EAAY,qDAAqDmG,0GAK/E,aAAauB,EAAAA,EAAmBE,0BAA0BM,EAAqB/K,EAAS2K,EAAcC,EAAQlB,EAAKG,EAAWxM,KAAKJ,KAAMoF,EAAS+C,EAAYC,EAAc+E,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQxO,GACV,MAAM8N,QAAwBjN,KAAKoN,0BAA0BjO,GAC7D,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAoCtD,SAAMW,CACFjL,EACAkL,EACAN,EACAO,EACA9I,EACAwI,EACAzF,EACAC,EACAtH,EACA+M,GAGA,IAAIC,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAIV,IAAK3F,IAAeC,EAChB,KACKD,EAAYC,SAAuChI,KAAK+L,YAAYjD,aAAa0E,GACpF,MAAO7B,GACL7H,QAAQ4I,IAAI,kDAAkDf,6CAQtE,OAHA7H,QAAQ4I,IAAI,2BACZ5I,QAAQ4I,IAAI,gBAAiB3E,GAC7BjE,QAAQ4I,IAAI,kBAAmB1E,GACxBkF,EAAAA,EAAmBa,uBAAuBL,EAAqB/K,EAASkL,EAAeN,EAAQO,GAAgB,EAAO9I,EAAS+C,EAAYC,EAAchI,KAAKJ,KAAM6N,GAiB/K,UAAM1C,CACFiD,EACAC,EACA5B,EACAC,EACAC,EACAC,EACA9L,EACA+M,GAGA,IAUId,EACA7B,EAXA4C,EAAsBhN,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBV,KAAKF,UACjD4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HN,QAAkC9K,KAAK+L,YAAYjB,WACrD,MAAOa,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,GAClCuB,EAAgBC,GAAoBrD,EAG3C,IACI0B,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsBO,EAClH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAI5E,IACIqC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBnL,WAAW+K,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBnL,WAAWgL,GAC5F,MAAOtC,GACL,MAAMnG,EAAY,mFAItB,MAAMyH,QAAWC,EAAAA,EAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW5B,EAAKG,EAAWxM,KAAKJ,KAAMsO,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,WAAMhC,CAAMqD,EAAqBC,EAAwC7N,EAAyB+M,GAE9F,IAUIzC,EAVA0C,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAKV,IACI1C,QAAmChL,KAAK+L,YAAYf,YACtD,MAAOW,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAO6C,EAAiBC,GAAqBzD,EAG7C,IACIuD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBnL,WAAWsL,GACrG,MAAO5C,GACL,MAAMnG,EAAY,+EAItB,MAAMyH,QAAWC,EAAAA,EAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcvO,KAAKJ,KAAM4O,EAAiBC,EAAmBhB,GACzJ,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAatD,oBAAM0B,CACFhM,EACAiM,EACArB,EACA7M,GAGA,IAAIsE,EAEA0I,EAAsBhN,OACS,IAAxBgN,IAEHA,OADwB,IAAjB1N,KAAKF,QACUE,KAAKF,QAAQY,aAEb,IAAIc,EAAAA,IAKlC,IACIwD,QAAgBhF,KAAKgM,cAAcjH,kBAAkBpC,GACrD,MAAM6G,QAAgB0D,EAAAA,EAAmB2B,kBACrCnB,EACA/K,EACAiM,EACArB,EACAvI,GAEJ,MAAO,CAAawE,EAAQzB,aAA4ByB,EAAQxB,gBAClE,MAAO2D,GACL,MAAMnG,EAAY,qCAAqCmG,sEAiC/D,8BAAMmD,CACFC,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUItC,EACAzC,EAXAwD,EAAsBhN,EAK1B,QAJmC,IAAxBgN,QAA+D,IAAjB1N,KAAKF,UAC1D4N,EAAsB1N,KAAKF,QAAQY,mBAGJ,IAAxBgN,EACP,KAAM,uEAMV,IACIf,EAAUL,QAAoCtM,KAAK+L,YAAYb,uBAA0ClL,KAAK+L,YAAYX,gBAC1HlB,QAAsClK,KAAK+L,YAAY7B,aAAa+E,GACtE,MAAOtD,GACL,MAAMnG,EAAY,iDAAiDmG,gEAEvE,MAAOoB,EAAeC,GAAmBL,GAClCwC,EAAoBC,GAAwBlF,EAGnD,IAEI,MAAMrJ,EAAmB,GACrBwO,EAAqBJ,IAErBV,QAAsCvO,KAAK6M,iBAAiBR,EAAK,GAAIkC,EAAchC,GACnF1L,EAAO8C,KAAK4K,EAAajL,UAEzBiL,OAAezB,EAEnBN,EAAYF,QAAoCtM,KAAK6M,iBAAiBR,EAAKxL,EAAQ2L,EAAWD,QAAsBO,EACtH,MAAOnB,GACL,MAAMnG,EAAY,sDAAsDmG,uGAI5E,aAAauB,EAAAA,EAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAclC,EAAKG,EAAWxM,KAAKJ,KAAMuP,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GAmB/H,4CAAM8B,CACFR,EACAC,EACA3C,EACA3L,EACA+M,GAEA,OAAOzN,KAAK8O,yBAAyBC,EAAQC,EAAW,SAAU3C,GAAK,OAAOS,OAAWA,OAAWA,EAAWpM,EAAY+M,GA+B/H,cAAM+B,CACFT,EACAC,EACAC,EACA5C,EACAC,EACAC,EACAgC,EACA/B,EACA9L,EACA+M,GAEA,MAAMR,QAAwBjN,KAAK8O,yBAAyBC,EAAQC,EAAWC,EAAc5C,EAAKC,EAAYC,EAAoBgC,EAAc/B,EAAW9L,EAAY+M,GACvK,aAAazN,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,gCAAMwC,CAA2BC,EAAwBC,EAA2BC,EAA4Bb,EAAgB5P,EAAmC,CAAC,GAChK,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgBC,EAAmBC,EAAuB,GAAAC,EAAa7L,iBAAgB,gBACjGwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBW,YAAYD,OAC5C/C,YAAaqC,EAAqBW,YAAY0B,SAC9CzE,SAAU,6BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,gBAAMC,CAAWT,EAAwBC,EAA2BC,EAA2Bb,EAAgB5P,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKyP,2BAA2BC,EAAgBC,EAAmBC,EAAoBb,EAAQ5P,GAC7H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,mCAAMmD,CAA8BT,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/J,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,GAE1BuB,EAAqBR,KAAKC,MAAMM,IAEhC,YACFhD,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BjB,EAAMlN,EAAQkN,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBiB,EAAS,CAACoC,EAAmBC,EAAoB,GAAGC,EAAa7L,gBAAiB,GAAGsM,EAAmBtM,gBAAe,gBACvHwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBc,eAAeJ,OAC/C/C,YAAaqC,EAAqBc,eAAeuB,SACjDzE,SAAU,gCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GA6BhD,mBAAMK,CAAcZ,EAA2BC,EAA4Bb,EAAgBsB,EAAoBlR,EAAmC,CAAC,GAC/I,MAAM8N,QAAwBjN,KAAKoQ,8BAA8BT,EAAmBC,EAAoBb,EAAQsB,EAAYlR,GAC5H,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAwBtD,kCAAMuD,CAA6Bd,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3G,MAAM0Q,EAAeC,KAAKC,MAAe,IAAThB,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BjB,EAAMlN,EAAQkN,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,EAAgB,GAAGG,EAAa7L,iBAAgB,gBAC1DwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBwC,cAAc9B,OAC9C/C,YAAaqC,EAAqBwC,cAAcH,SAChDzE,SAAU,+BACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,OAAOjQ,KAAKoN,0BAA0B8C,GA4B1C,kBAAMO,CAAaf,EAAwBX,EAAgB5P,EAAmC,CAAC,GAC3F,MAAM8N,QAAwBjN,KAAKwQ,6BAA6Bd,EAAgBX,EAAQ5P,GACxF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAyBtD,uCAAMyD,CAAkChB,EAAwBvQ,EAAmC,CAAC,GAChG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAMlN,EAAQkN,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBiB,EAAS,CAACmC,GAAe,gBACzBlC,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBgB,oBAAoBN,OACpD/C,YAAaqC,EAAqBgB,oBAAoBqB,SACtDzE,SAAU,qCACZ,QACFlE,EAAU3C,KAAKgQ,oBACZC,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAKoN,0BAA0B8C,GAuBhD,uBAAMS,CAAkBjB,EAAwBvQ,EAAmC,CAAC,GAChF,MAAM8N,QAAwBjN,KAAK0Q,kCAAkChB,EAAgBvQ,GACrF,aAAaa,KAAKgM,cAAc9F,kBAAkB+G,GAiCtD,uCAAM2D,CAAkCC,EAA0B1R,EAAmC,CAAC,GAClG,MAAM,YACFkO,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpCjB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBiB,EAAS,CAACsD,EAAgB7M,YAAW,gBACrCwJ,EAAkB,IAAI/G,EAAsB,CACxCE,UAAWsC,EAAqBuC,oBAAoB7B,OACpD/C,YAAaqC,EAAqBuC,oBAAoBF,SACtDzE,SAAU,wCAEXoJ,GACH9Q,EAEE+Q,EAAiC,CACnC7C,cACAC,eACAjB,MACAC,aACAiB,SACAC,qBACGyC,GAGP,aAAajQ,KAAK2N,QAAQuC,GA8B9B,uBAAMY,CAAkBD,EAA0B1R,EAAmC,CAAC,GAClF,MAAM8N,QAAmBjN,KAAK4Q,kCAAkCC,EAAiB1R,GACjF,OAAOa,KAAKgM,cAAc9F,kBAAkB+G,GAShD8D,eAAAA,CAAgBC,GACZ,IACI,MAAMzO,EAAuByO,EAAkBC,eACzCrC,EAAcoC,EAAkBE,gBAChCvO,EAAUqO,EAAkBrM,aAC5BqD,EAAegJ,EAAkB3H,kBACvC,OAAO8H,EAAAA,EAAAA,IAAwB5O,EAAWyF,EAAcrF,EAASiM,GACnE,MAAMjD,GAEJ,OADA7H,QAAQC,KAAK,6EACN,GAUfqN,uBAAAA,CAAwBzO,GACpB,OAAOyB,EAAAA,GAAQnB,WAAWN,GAQ9BqN,cAAAA,GACI,OAAO5L,EAAAA,GAAQiN,oBAQnBC,aAAAA,CAAc3O,GACV,IAEI,OADSyB,EAAAA,GAAQnB,WAAWN,IACrB,EACT,MAAOgJ,GACL,OAAO,GAKf,sBAAMkB,CAAiBkC,EAAgBlO,EAAkBkC,EAAmC+D,GACxF,IACI,OAAO/D,aAAkBqL,EAAAA,GAAkBrL,EAASqL,EAAAA,GAAgBnL,WAAmBF,GACzF,MAAO4I,GACL,IACI,MAAMM,EAAiCjM,KAAKiM,eAC5C,aAA+BA,EAAesF,kBAAkBxC,GAAQ,EAAMlO,EAAQiG,GACxF,MAAO6E,GACL,MAAMnG,EAAY,sDAAsDmG,0GAOxF,SAAS0D,EAAqBJ,GAC1B,OAAOuC,EAAuBpJ,IAAI6G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOwC,EAAqBrJ,IAAI6G,GAAgBA,EAC5CzJ,EAAY,0BAA0ByJ,8FAC9C,CCjwCA,MAAM1H,EAAYmK,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAM7J,EAAgBa,EAAAA,GAAqBgJ,EAAS7J,cAEpD,IAAKA,EACD,MAAM,IAAIzI,MAAM,wBAA0BsS,EAAS7J,cAGvD,MAAO,CACHtB,KAAMmL,EAASnL,KACf6C,QAASsI,EAAStI,QAClBI,OAAQkI,EAASlI,OACjB2B,SAAUuG,EAASvG,SACnBtD,eAER,CAEA,MAAMiB,EAAuB,CACzBW,YAAagI,EAAQF,EAAAA,GAAS9H,eAC9BG,eAAgB6H,EAAQF,EAAAA,GAAS3H,kBACjCE,oBAAqB2H,EAAQF,EAAAA,GAASzH,uBACtCkB,YAAayG,EAAQF,EAAAA,GAASvG,eAC9BE,WAAYuG,EAAQF,EAAAA,GAASrG,cAC7BE,UAAWqG,EAAQF,EAAAA,GAASnG,aAC5BR,KAAM6G,EAAQF,EAAAA,GAAS3G,QACvBS,oBAAqBoG,EAAQF,EAAAA,GAASlG,uBACtCP,MAAO2G,EAAQF,EAAAA,GAASzG,SACxBZ,iBAAkBuH,EAAQF,EAAAA,GAASrH,oBACnCE,2BAA4BqH,EAAQF,EAAAA,GAASnH,8BAC7CE,gBAAiBmH,EAAQF,EAAAA,GAASjH,mBAClCE,0BAA2BiH,EAAQF,EAAAA,GAAS/G,6BAC5CE,2BAA4B+G,EAAQF,EAAAA,GAAS7G,8BAC7CY,cAAemG,EAAQF,EAAAA,GAASjG,iBAChCvC,OAAQ,SAAS3D,GACb,OAAIvF,KAAKoF,eAAeG,GACZvF,KAAauF,GAEd,IAAIhG,MAAM,QAAQgG,mBAK/BiM,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEE1H,EAAmB,IAAI0H,IAAI,CAC7B,UACA,mBACA,oBAEExH,EAA6B,IAAIwH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEEtH,EAAkB,IAAIsH,IAAI,CAC5B,SACA,kBACA,mBAEEpH,EAA4B,IAAIoH,IAAI,CACtC,mBACA,4BACA,2BAEElH,EAA6B,IAAIkH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAStM,EAAYgB,GAEjB,MADA1C,QAAQxD,MAAMkG,GACRA,CACV,6IC3GMuL,EAAAA,EAAAA,MAEN,MAAMC,EAAc,mCACdjG,EAAc,IAAIhF,EAAAA,gBAClBkL,EAAiB,IAAInG,EAAAA,eACvBkG,EACAjG,OACAe,GAGJf,EAAYtE,UAAS,GAErB,IAAIyK,EAA2B,GAY/BlT,eAAe4O,EACXuE,EACAC,EACA7E,EACA7M,EACAoN,GAAiB,GAEjBhK,QAAQ4I,IAAI,6CACZ,MAAM2F,EAAYC,YAAYC,MAE9B,IAEI,MAAM5P,EAAUsP,EAAeb,wBAAwBe,GACvD,GAAIxP,aAAmBpD,MACnB,KAAM,qCAEV,MAAMiT,EAAa7P,EAAQmD,KAC3B,IAAKnD,EAAQ8P,YAAYL,GACrB,KAAiB,WAAAI,+BAAwCJ,IAE7D,MAAMvL,EAAW,GAAG2L,KAAcJ,IAG5BpN,QAAgBiN,EAAejG,cAAcjH,kBAC/CoN,GAGJ,GAAInN,aAAmBzF,MACnB,KAAM,gCAGV,GAAI2S,IAAqBC,EAAc,CACnC,MAAMrK,QAA8BmK,EAAetD,eAC/CwD,EACAC,EACA7E,EACA/L,EAAAA,GAAWC,YAAYf,IAE3BuR,EAAelG,YAAYnE,UAAUf,EAAUiB,GAC/CoK,EAAmBC,EAIvB,MAAMO,EAAY,IAAIjM,EAAAA,sBAAsB,CACxCI,SAAUA,IAIRzH,QAAiB6S,EAAerE,IAClCuE,EACAC,EACA7E,EACAO,EACA9I,EACA0N,OACA5F,OACAA,EACAtL,EAAAA,GAAWC,YAAYf,IAI3BoD,QAAQ4I,IACJ,4CACI4F,YAAYC,MAAQF,QAG5B,MAAMzP,EAAUxD,EAASuT,aACnBpQ,EAAYnD,EAAS6R,eAC3B,IAAI2B,EAAkB,GAEtB,MAAM9K,EAAOiE,EAAYxD,QAAQ1B,GAEjC,GAAIiB,aAAgBvI,MAChB,KAAM,8BAGV,MAAMyI,EAAeF,EAAK,GAiB1B,OAfIvF,IACA4O,EAAAA,EAAAA,IACI5O,EACAyF,EACArF,EACA,SAEJiQ,EAAkBrQ,EAAUyB,WAC5BF,QAAQ4I,IAAI,oCAAsCnK,IAElDqQ,EAAkB,GAGtB9O,QAAQ4I,IAAI,gCAAgC9J,KAErC,CAAEA,QAASA,EAASL,UAAWqQ,GACxC,MAAOtS,GAEL,OADAwD,QAAQxD,MAAMA,GACPA,EAAQA,EAAM0D,WAAa,gBAE1C,CAEAhF,eAAe6T,IAEX,OADmB,IAAIrR,EAAAA,IACLsR,WACtB,CAEA,MAAMC,EAAY,CAAEnF,MAAKiF,kBACzBG,EAAAA,EAAAA,IAAOD,6DCjIP,MAAME,EAAcC,OAAO,iBACrBC,EAAiBD,OAAO,oBACxBE,EAAeF,OAAO,wBACtBG,EAAYH,OAAO,qBACnBI,EAAcJ,OAAO,kBACrBK,EAAYC,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEC,EAAmB,IAAIjM,IAAI,CAC7B,CAAC,QA7CwB,CACzBkM,UAAYF,GAAQD,EAASC,IAAQA,EAAIP,GACzC,SAAAU,CAAUC,GACN,MAAM,MAAEC,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAf,EAAOY,EAAKC,GACL,CAACC,EAAO,CAACA,GACpB,EACA,WAAAE,CAAYC,GAER,OADAA,EAAKjT,QAiJFkT,EAhJSD,EAgJO,GAAIE,GAD/B,IAAkBA,CA9Id,IAoCA,CAAC,QA/BwB,CACzBT,UAAYxQ,GAAUqQ,EAASrQ,IAAUoQ,KAAepQ,EACxD,SAAAyQ,EAAU,MAAEzQ,IACR,IAAIkR,EAcJ,OAZIA,EADAlR,aAAiB3D,MACJ,CACT8U,SAAS,EACTnR,MAAO,CACHsD,QAAStD,EAAMsD,QACfE,KAAMxD,EAAMwD,KACZ4N,MAAOpR,EAAMoR,QAKR,CAAED,SAAS,EAAOnR,SAE5B,CAACkR,EAAY,GACxB,EACA,WAAAJ,CAAYI,GACR,GAAIA,EAAWC,QACX,MAAM/N,OAAOC,OAAO,IAAIhH,MAAM6U,EAAWlR,MAAMsD,SAAU4N,EAAWlR,OAExE,MAAMkR,EAAWlR,KACrB,MAoBJ,SAAS8P,EAAOY,EAAKW,EAAKC,WAAYC,EAAiB,CAAC,MACpDF,EAAGG,iBAAiB,WAAW,SAASC,EAASC,GAC7C,IAAKA,IAAOA,EAAGxN,KACX,OAEJ,IAhBR,SAAyBqN,EAAgBI,GACrC,IAAK,MAAMC,KAAiBL,EAAgB,CACxC,GAAII,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBR,EAAgBG,EAAGC,QAEpC,YADA/Q,QAAQC,KAAK,mBAAmB6Q,EAAGC,6BAGvC,MAAM,GAAE/O,EAAE,KAAEzD,EAAI,KAAE6S,GAAS5O,OAAOC,OAAO,CAAE2O,KAAM,IAAMN,EAAGxN,MACpD+N,GAAgBP,EAAGxN,KAAK+N,cAAgB,IAAIC,IAAIC,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASL,EAAKM,MAAM,GAAI,GAAGC,QAAO,CAAC7B,EAAK8B,IAAS9B,EAAI8B,IAAO9B,GAC5D+B,EAAWT,EAAKO,QAAO,CAAC7B,EAAK8B,IAAS9B,EAAI8B,IAAO9B,GACvD,OAAQvR,GACJ,IAAK,MAEGiT,EAAcK,EAElB,MACJ,IAAK,MAEGJ,EAAOL,EAAKM,OAAO,GAAG,IAAMH,EAAcT,EAAGxN,KAAKlE,OAClDoS,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcK,EAASC,MAAML,EAAQJ,GAEzC,MACJ,IAAK,YAGGG,EA6KxB,SAAe1B,GACX,OAAOtN,OAAOC,OAAOqN,EAAK,CAAE,CAACX,IAAc,GAC/C,CA/KsC4C,CADA,IAAIF,KAAYR,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAEtB,EAAK,MAAEC,GAAU,IAAIC,eAC7Bf,EAAOY,EAAKE,GACZwB,EAkKxB,SAAkB1B,EAAKkC,GAEnB,OADAC,EAAc9N,IAAI2L,EAAKkC,GAChBlC,CACX,CArKsCpE,CAASqE,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGyB,OAAcxI,EAElB,MACJ,QACI,OAEZ,CACA,MAAO5J,GACHoS,EAAc,CAAEpS,QAAO,CAACoQ,GAAc,EAC1C,CACA0C,QAAQC,QAAQX,GACXY,OAAOhT,IACD,CAAEA,QAAO,CAACoQ,GAAc,MAE9B6C,MAAMb,IACP,MAAOc,EAAWC,GAAiBC,EAAYhB,GAC/Cf,EAAGgC,YAAYjQ,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAG6P,GAAY,CAAEtQ,OAAOuQ,GACvD,YAAThU,IAEAkS,EAAGiC,oBAAoB,UAAW7B,GAClC8B,EAAclC,GACVlB,KAAaO,GAAiC,mBAAnBA,EAAIP,IAC/BO,EAAIP,KAEZ,IAEC6C,OAAO5V,IAER,MAAO8V,EAAWC,GAAiBC,EAAY,CAC3CpT,MAAO,IAAIwT,UAAU,+BACrB,CAACpD,GAAc,IAEnBiB,EAAGgC,YAAYjQ,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAG6P,GAAY,CAAEtQ,OAAOuQ,EAAc,GAE1F,IACI9B,EAAGvT,OACHuT,EAAGvT,OAEX,CAIA,SAASyV,EAAcE,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAAS5W,YAAY2G,IAChC,EAEQkQ,CAAcD,IACdA,EAASE,OACjB,CAIA,SAASC,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIxX,MAAM,6CAExB,CACA,SAASyX,EAAgBzC,GACrB,OAAO0C,EAAuB1C,EAAI,CAC9BlS,KAAM,YACP8T,MAAK,KACJM,EAAclC,EAAG,GAEzB,CACA,MAAM2C,EAAe,IAAIC,QACnBC,EAAkB,yBAA0B5C,YAC9C,IAAI6C,sBAAsB9C,IACtB,MAAM+C,GAAYJ,EAAajY,IAAIsV,IAAO,GAAK,EAC/C2C,EAAajP,IAAIsM,EAAI+C,GACJ,IAAbA,GACAN,EAAgBzC,EACpB,IAcR,SAASL,EAAYK,EAAIW,EAAO,GAAIf,EAAS,WAAc,GACvD,IAAIoD,GAAkB,EACtB,MAAM1B,EAAQ,IAAI2B,MAAMrD,EAAQ,CAC5B,GAAAlV,CAAIwY,EAAS/B,GAET,GADAoB,EAAqBS,GACjB7B,IAAStC,EACT,MAAO,MAXvB,SAAyByC,GACjBuB,GACAA,EAAgBM,WAAW7B,EAEnC,CAQoB8B,CAAgB9B,GAChBmB,EAAgBzC,GAChBgD,GAAkB,CAAI,EAG9B,GAAa,SAAT7B,EAAiB,CACjB,GAAoB,IAAhBR,EAAKjT,OACL,MAAO,CAAEkU,KAAM,IAAMN,GAEzB,MAAM+B,EAAIX,EAAuB1C,EAAI,CACjClS,KAAM,MACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,eACzBmS,KAAKd,GACR,OAAOuC,EAAEzB,KAAK2B,KAAKF,EACvB,CACA,OAAO1D,EAAYK,EAAI,IAAIW,EAAMQ,GACrC,EACA,GAAAzN,CAAIwP,EAAS/B,EAAMC,GACfmB,EAAqBS,GAGrB,MAAOrU,EAAOmT,GAAiBC,EAAYX,GAC3C,OAAOsB,EAAuB1C,EAAI,CAC9BlS,KAAM,MACN6S,KAAM,IAAIA,EAAMQ,GAAMN,KAAKyC,GAAMA,EAAE7T,aACnCd,SACDmT,GAAeF,KAAKd,EAC3B,EACA,KAAAO,CAAM6B,EAASM,EAAUC,GACrBlB,EAAqBS,GACrB,MAAMU,EAAO/C,EAAKA,EAAKjT,OAAS,GAChC,GAAIgW,IAAS9E,EACT,OAAO8D,EAAuB1C,EAAI,CAC9BlS,KAAM,aACP8T,KAAKd,GAGZ,GAAa,SAAT4C,EACA,OAAO/D,EAAYK,EAAIW,EAAKM,MAAM,GAAI,IAE1C,MAAOL,EAAckB,GAAiB6B,EAAiBF,GACvD,OAAOf,EAAuB1C,EAAI,CAC9BlS,KAAM,QACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,aACxBmR,gBACDkB,GAAeF,KAAKd,EAC3B,EACA,SAAA8C,CAAUV,EAASO,GACflB,EAAqBS,GACrB,MAAOpC,EAAckB,GAAiB6B,EAAiBF,GACvD,OAAOf,EAAuB1C,EAAI,CAC9BlS,KAAM,YACN6S,KAAMA,EAAKE,KAAKyC,GAAMA,EAAE7T,aACxBmR,gBACDkB,GAAeF,KAAKd,EAC3B,IAGJ,OA7EJ,SAAuBQ,EAAOtB,GAC1B,MAAM+C,GAAYJ,EAAajY,IAAIsV,IAAO,GAAK,EAC/C2C,EAAajP,IAAIsM,EAAI+C,GACjBF,GACAA,EAAgBgB,SAASvC,EAAOtB,EAAIsB,EAE5C,CAsEIwC,CAAcxC,EAAOtB,GACdsB,CACX,CAIA,SAASqC,EAAiB/C,GACtB,MAAMmD,EAAYnD,EAAaC,IAAIkB,GACnC,MAAO,CAACgC,EAAUlD,KAAKmD,GAAMA,EAAE,MALnBC,EAK+BF,EAAUlD,KAAKmD,GAAMA,EAAE,KAJ3DxX,MAAM0X,UAAUC,OAAO9C,MAAM,GAAI4C,KAD5C,IAAgBA,CAMhB,CACA,MAAMzC,EAAgB,IAAIoB,QAe1B,SAASb,EAAYpT,GACjB,IAAK,MAAOwD,EAAMiS,KAAYlF,EAC1B,GAAIkF,EAAQjF,UAAUxQ,GAAQ,CAC1B,MAAO0V,EAAiBvC,GAAiBsC,EAAQhF,UAAUzQ,GAC3D,MAAO,CACH,CACIb,KAAM,UACNqE,OACAxD,MAAO0V,GAEXvC,EAER,CAEJ,MAAO,CACH,CACIhU,KAAM,MACNa,SAEJ6S,EAAc9W,IAAIiE,IAAU,GAEpC,CACA,SAASmS,EAAcnS,GACnB,OAAQA,EAAMb,MACV,IAAK,UACD,OAAOoR,EAAiBxU,IAAIiE,EAAMwD,MAAMsN,YAAY9Q,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAAS+T,EAAuB1C,EAAIsE,EAAK/C,GACrC,OAAO,IAAIE,SAASC,IAChB,MAAMnQ,EAeH,IAAI/E,MAAM,GACZ+X,KAAK,GACL1D,KAAI,IAAMtF,KAAKiJ,MAAMjJ,KAAKkJ,SAAWC,OAAOC,kBAAkBlV,SAAS,MACvE+G,KAAK,KAjBNwJ,EAAGG,iBAAiB,WAAW,SAAS7R,EAAE+R,GACjCA,EAAGxN,MAASwN,EAAGxN,KAAKtB,IAAM8O,EAAGxN,KAAKtB,KAAOA,IAG9CyO,EAAGiC,oBAAoB,UAAW3T,GAClCoT,EAAQrB,EAAGxN,MACf,IACImN,EAAGvT,OACHuT,EAAGvT,QAEPuT,EAAGgC,YAAYjQ,OAAOC,OAAO,CAAET,MAAM+S,GAAM/C,EAAU,GAE7D,IC/UIqD,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBvM,IAAjBwM,EACH,OAAOA,EAAaC,QAGrB,IAAIC,EAASL,EAAyBE,GAAY,CAGjDE,QAAS,CAAC,GAOX,OAHAE,EAAoBJ,GAAUG,EAAQA,EAAOD,QAASH,GAG/CI,EAAOD,OACf,CAGAH,EAAoBM,EAAID,EAGxBL,EAAoBO,EAAI,KAGvB,IAAIC,EAAsBR,EAAoBS,OAAE/M,EAAW,CAAC,MAAM,IAAOsM,EAAoB,QAE7F,OADAQ,EAAsBR,EAAoBS,EAAED,EAClB,EVjCvBlb,EAAkC,mBAAXwU,OAAwBA,OAAO,kBAAoB,qBAC1EvU,EAAmC,mBAAXuU,OAAwBA,OAAO,mBAAqB,sBAC5EtU,EAAiC,mBAAXsU,OAAwBA,OAAO,iBAAmB,oBACxErU,EAAgBib,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGrC,MAC1BkC,EAAME,SAASC,GAAQA,EAAGrC,IAAMqC,EAAGrC,IAAMqC,MAC1C,EAyBDb,EAAoBc,EAAI,CAACV,EAAQnT,EAAM8T,KACtC,IAAIL,EACJK,KAAcL,EAAQ,IAAIC,GAAK,GAC/B,IAEIK,EACAC,EACAC,EAJAC,EAAY,IAAIzI,IAChByH,EAAUC,EAAOD,QAIjBiB,EAAU,IAAIxE,SAAQ,CAACC,EAASwE,KACnCH,EAASG,EACTJ,EAAepE,CAAO,IAEvBuE,EAAQ7b,GAAkB4a,EAC1BiB,EAAQ9b,GAAkBub,IAAQH,GAASG,EAAGH,GAAQS,EAAUP,QAAQC,GAAKO,EAAe,OAAEb,SAC9FH,EAAOD,QAAUiB,EACjBnU,GAAMqU,IAEL,IAAIT,EADJG,EAvCa,CAACM,GAAUA,EAAKtF,KAAKuF,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAIjc,GAAgB,OAAOic,EAC9B,GAAGA,EAAIxE,KAAM,CACZ,IAAI2D,EAAQ,GACZA,EAAMC,EAAI,EACVY,EAAIxE,MAAMyB,IACThE,EAAIjV,GAAkBiZ,EACtB/Y,EAAaib,EAAM,IAChBnO,IACHiI,EAAIhV,GAAgB+M,EACpB9M,EAAaib,EAAM,IAEpB,IAAIlG,EAAM,CAAC,EAEX,OADAA,EAAIlV,GAAkBub,GAAQA,EAAGH,GAC1BlG,CACR,CACD,CACA,IAAIgH,EAAM,CAAC,EAGX,OAFAA,EAAIlc,GAAiBib,MACrBiB,EAAIjc,GAAkBgc,EACfC,CAAG,IAkBKC,CAASH,GAEvB,IAAII,EAAY,IAAOV,EAAYhF,KAAK2E,IACvC,GAAGA,EAAEnb,GAAe,MAAMmb,EAAEnb,GAC5B,OAAOmb,EAAEpb,EAAe,IAErB6b,EAAU,IAAIxE,SAASC,KAC1BgE,EAAK,IAAOhE,EAAQ6E,IACjBlD,EAAI,EACP,IAAImD,EAAWC,GAAOA,IAAMlB,IAAUS,EAAUnS,IAAI4S,KAAOT,EAAUU,IAAID,GAAIA,IAAMA,EAAEjB,IAAME,EAAGrC,IAAKoD,EAAErX,KAAKsW,KAC1GG,EAAYhF,KAAKuF,GAASA,EAAIjc,GAAeqc,IAAU,IAExD,OAAOd,EAAGrC,EAAI4C,EAAUM,GAAW,IAChCI,IAAUA,EAAMZ,EAAOE,EAAQ5b,GAAgBsc,GAAOb,EAAad,GAAW1a,EAAaib,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlCjb,EAAW,GACfsa,EAAoBS,EAAI,CAACsB,EAAQC,EAAUnB,EAAIoB,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASvZ,EAAI,EAAGA,EAAIlD,EAASmD,OAAQD,IAAK,CAGzC,IAFA,IAAKoZ,EAAUnB,EAAIoB,GAAYvc,EAASkD,GACpCwZ,GAAY,EACPrZ,EAAI,EAAGA,EAAIiZ,EAASnZ,OAAQE,MACpB,EAAXkZ,GAAsBC,GAAgBD,IAAa/U,OAAOwB,KAAKsR,EAAoBS,GAAG4B,OAAOlW,GAAS6T,EAAoBS,EAAEtU,GAAK6V,EAASjZ,MAC9IiZ,EAASM,OAAOvZ,IAAK,IAErBqZ,GAAY,EACTH,EAAWC,IAAcA,EAAeD,IAG7C,GAAGG,EAAW,CACb1c,EAAS4c,OAAO1Z,IAAK,GACrB,IAAI4V,EAAIqC,SACEnN,IAAN8K,IAAiBuD,EAASvD,EAC/B,CACD,CACA,OAAOuD,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIrZ,EAAIlD,EAASmD,OAAQD,EAAI,GAAKlD,EAASkD,EAAI,GAAG,GAAKqZ,EAAUrZ,IAAKlD,EAASkD,GAAKlD,EAASkD,EAAI,GACrGlD,EAASkD,GAAK,CAACoZ,EAAUnB,EAAIoB,EAqBjB,EUzBdjC,EAAoBW,EAAI,CAACR,EAASoC,KACjC,IAAI,IAAIpW,KAAOoW,EACXvC,EAAoBwC,EAAED,EAAYpW,KAAS6T,EAAoBwC,EAAErC,EAAShU,IAC5Ee,OAAOuV,eAAetC,EAAShU,EAAK,CAAEuW,YAAY,EAAM7c,IAAK0c,EAAWpW,IAE1E,ECND6T,EAAoB2C,EAAI,CAAC,EAGzB3C,EAAoBzN,EAAKqQ,GACjBhG,QAAQiG,IAAI3V,OAAOwB,KAAKsR,EAAoB2C,GAAGtG,QAAO,CAACyG,EAAU3W,KACvE6T,EAAoB2C,EAAExW,GAAKyW,EAASE,GAC7BA,IACL,KCNJ9C,EAAoB+C,EAAKH,GAEZA,EAAU,aCHvB5C,EAAoBgD,EAAI,WACvB,GAA0B,iBAAf5H,WAAyB,OAAOA,WAC3C,IACC,OAAOxU,MAAQ,IAAIqc,SAAS,cAAb,EAChB,CAAE,MAAO1Q,GACR,GAAsB,iBAAX2Q,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBlD,EAAoBwC,EAAI,CAAChI,EAAK8B,IAAUpP,OAAOmS,UAAUrT,eAAemX,KAAK3I,EAAK8B,SCAlF,IAAI8G,EACApD,EAAoBgD,EAAEK,gBAAeD,EAAYpD,EAAoBgD,EAAEM,SAAW,IACtF,IAAIC,EAAWvD,EAAoBgD,EAAEO,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQ7a,OAEV,IADA,IAAID,EAAI8a,EAAQ7a,OAAS,EAClBD,GAAK,IAAMwa,GAAWA,EAAYM,EAAQ9a,KAAK6a,GAExD,CAID,IAAKL,EAAW,MAAM,IAAIjd,MAAM,yDAChCid,EAAYA,EAAUnY,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpF+U,EAAoBvB,EAAI2E,YClBxBpD,EAAoB4D,EAAIC,KAAKP,SAAW,GAIxC,IAAIQ,EAAkB,CACrB,IAAK,GAgBN9D,EAAoB2C,EAAE/Z,EAAI,CAACga,EAASE,KAE/BgB,EAAgBlB,IAElBS,cAAcrD,EAAoBvB,EAAIuB,EAAoB+C,EAAEH,GAE9D,EAGD,IAAImB,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBxZ,KAAKmU,KAAKqF,GAC9DA,EAAmBxZ,KAvBCyD,IACnB,IAAKgU,EAAUiC,EAAaC,GAAWlW,EACvC,IAAI,IAAIiS,KAAYgE,EAChBjE,EAAoBwC,EAAEyB,EAAahE,KACrCD,EAAoBM,EAAEL,GAAYgE,EAAYhE,IAIhD,IADGiE,GAASA,EAAQlE,GACdgC,EAASnZ,QACdib,EAAgB9B,EAASmC,OAAS,EACnCH,EAA2BhW,EAAK,MfnB7BrI,EAAOqa,EAAoBO,EAC/BP,EAAoBO,EAAI,IAChBP,EAAoBzN,EAAE,KAAKwK,KAAKpX,GgBDdqa,EAAoBO","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/../src/worker.ts","webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn __webpack_require__.e(933).then(next);\n};","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","import {initThreadPool, ProgramManager, PrivateKey, verifyFunctionExecution, FunctionKeyPair} from \"./index\";\nimport { AleoKeyProvider, AleoKeyProviderParams} from \"./function-key-provider\";\nimport { expose } from \"comlink\";\n\nawait initThreadPool();\n\nconst defaultHost = \"https://api.explorer.aleo.org/v1\";\nconst keyProvider = new AleoKeyProvider();\nconst programManager = new ProgramManager(\n defaultHost,\n keyProvider,\n undefined\n);\n\nkeyProvider.useCache(true);\n\nlet lastLocalProgram: string = \"\";\n\nexport interface WorkerAPI {\n run: (\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string\n ) => Promise<{ outputs: any; execution: string } | string>;\n\n getPrivateKey: () => Promise;\n}\nasync function run(\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string,\n proveExecution = false\n) {\n console.log(\"Web worker: Executing function locally...\");\n const startTime = performance.now();\n\n try {\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n if (program instanceof Error) {\n throw \"Error creating program from source\";\n }\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = await programManager.networkClient.getProgramImports(\n localProgram\n );\n\n if (imports instanceof Error) {\n throw \"Error getting program imports\";\n }\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(\n localProgram,\n aleoFunction,\n inputs,\n PrivateKey.from_string(privateKey)\n );\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new AleoKeyProviderParams({\n cacheKey: cacheKey,\n });\n\n // Execute the function locally\n const response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n proveExecution,\n imports,\n keyParams,\n undefined,\n undefined,\n PrivateKey.from_string(privateKey),\n );\n\n // Return the outputs to the main thread\n console.log(\n `Web worker: Local execution completed in ${\n performance.now() - startTime\n } ms`\n );\n const outputs = response.getOutputs();\n const execution = response.getExecution();\n let executionString = \"\";\n\n const keys = keyProvider.getKeys(cacheKey);\n\n if (keys instanceof Error) {\n throw \"Could not get verifying key\";\n }\n\n const verifyingKey = keys[1];\n\n if (execution) {\n verifyFunctionExecution(\n execution,\n verifyingKey,\n program,\n \"hello\"\n );\n executionString = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n executionString = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n\n return { outputs: outputs, execution: executionString };\n } catch (error) {\n console.error(error);\n return error ? error.toString() : \"Unknown error\";\n }\n}\n\nasync function getPrivateKey() {\n const privateKey = new PrivateKey();\n return privateKey.to_string();\n}\n\nconst workerAPI = { run, getPrivateKey };\nexpose(workerAPI);\n","/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [933], () => (__webpack_require__(9669)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && !scriptUrl) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t530: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","async","get","url","options","response","fetch","ok","Error","status","post","method","AleoNetworkClient","host","headers","account","constructor","this","setAccount","getAccount","setHost","fetchData","json","error","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","Array","start","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","length","transactions","j","confirmedTransaction","type","transaction","execution","transitions","k","transition","program","outputs","l","output","record","RecordCiphertext","fromString","value","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","console","warn","toString","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","id","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","Object","assign","message","AleoKeyProviderParams","name","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","data","arrayBuffer","Uint8Array","KEY_STORE","Map","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","set","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","join","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","undefined","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","transfer","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","Math","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initThreadPool","defaultHost","programManager","lastLocalProgram","localProgram","aleoFunction","startTime","performance","now","program_id","hasFunction","keyParams","getOutputs","executionString","getPrivateKey","to_string","workerAPI","expose","proxyMarker","Symbol","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","val","transferHandlers","canHandle","serialize","obj","port1","port2","MessageChannel","deserialize","port","createProxy","target","serialized","isError","stack","ep","globalThis","allowedOrigins","addEventListener","callback","ev","origin","allowedOrigin","RegExp","test","isAllowedOrigin","path","argumentList","map","fromWireValue","returnValue","parent","slice","reduce","prop","rawValue","apply","proxy","transfers","transferCache","Promise","resolve","catch","then","wireValue","transferables","toWireValue","postMessage","removeEventListener","closeEndPoint","TypeError","endpoint","isMessagePort","close","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","FinalizationRegistry","newCount","isProxyReleased","Proxy","_target","unregister","unregisterProxy","r","p","bind","_thisArg","rawArgumentList","last","processArguments","construct","register","registerProxy","processed","v","arr","prototype","concat","handler","serializedValue","msg","fill","floor","random","Number","MAX_SAFE_INTEGER","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","queue","d","forEach","fn","a","hasAwait","currentDeps","outerResolve","reject","depQueues","promise","rej","deps","dep","ret","wrapDeps","getResult","fnQueue","q","add","err","result","chunkIds","priority","notFulfilled","Infinity","fulfilled","every","splice","definition","o","defineProperty","enumerable","f","chunkId","all","promises","u","g","Function","window","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/8cbe7e9b06e560a22f36.wasm b/58342153fc9a001d7976.wasm similarity index 71% rename from 8cbe7e9b06e560a22f36.wasm rename to 58342153fc9a001d7976.wasm index 77b84d3a8..d98df8e58 100644 Binary files a/8cbe7e9b06e560a22f36.wasm and b/58342153fc9a001d7976.wasm differ diff --git a/587.bundle.js b/587.bundle.js new file mode 100644 index 000000000..6068afe4d --- /dev/null +++ b/587.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[907,877],(()=>c(341)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={587:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([c.e(907),c.e(877)]).then(n);c.x()})(); +//# sourceMappingURL=587.bundle.js.map \ No newline at end of file diff --git a/587.bundle.js.map b/587.bundle.js.map new file mode 100644 index 000000000..b3aa6bb16 --- /dev/null +++ b/587.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"587.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,MAAM,IAAOH,EAAoB,OAEjG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAClBjE,EAAoBkC,EAAE,KACtBlC,EAAoBkC,EAAE,OACpBF,KAAKlC,GSJiBE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([\n\t\t__webpack_require__.e(907),\n\t\t__webpack_require__.e(877)\n\t]).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [907,877], () => (__webpack_require__(341)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t587: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/63.bundle.js b/63.bundle.js new file mode 100644 index 000000000..c2eb763a6 --- /dev/null +++ b/63.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={63:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=63.bundle.js.map \ No newline at end of file diff --git a/63.bundle.js.map b/63.bundle.js.map new file mode 100644 index 000000000..124deca87 --- /dev/null +++ b/63.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"63.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,GAAI,GAgBL5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t63: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/66.bundle.js b/66.bundle.js new file mode 100644 index 000000000..e8643a8d9 --- /dev/null +++ b/66.bundle.js @@ -0,0 +1,3 @@ +/*! For license information please see 66.bundle.js.LICENSE.txt */ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[66],{66:(e,t,r)=>{r.a(e,(async(e,t)=>{try{var n=r(495),o=e([n]);function u(e){return u="function"==typeof Symbol&&"symbol"==typeof Symbol.iterator?function(e){return typeof e}:function(e){return e&&"function"==typeof Symbol&&e.constructor===Symbol&&e!==Symbol.prototype?"symbol":typeof e},u(e)}function l(){throw new TypeError("Invalid attempt to destructure non-iterable instance.\nIn order to be iterable, non-array objects must have a [Symbol.iterator]() method.")}function f(e,t){if(e){if("string"==typeof e)return p(e,t);var r={}.toString.call(e).slice(8,-1);return"Object"===r&&e.constructor&&(r=e.constructor.name),"Map"===r||"Set"===r?Array.from(e):"Arguments"===r||/^(?:Ui|I)nt(?:8|16|32)(?:Clamped)?Array$/.test(r)?p(e,t):void 0}}function p(e,t){(null==t||t>e.length)&&(t=e.length);for(var r=0,n=Array(t);r=0;--a){var c=this.tryEntries[a],i=c.completion;if("root"===c.tryLoc)return o("end");if(c.tryLoc<=this.prev){var s=n.call(c,"catchLoc"),u=n.call(c,"finallyLoc");if(s&&u){if(this.prev=0;--r){var o=this.tryEntries[r];if(o.tryLoc<=this.prev&&n.call(o,"finallyLoc")&&this.prev=0;--t){var r=this.tryEntries[t];if(r.finallyLoc===e)return this.complete(r.completion,r.afterLoc),S(r),d}},catch:function(e){for(var t=this.tryEntries.length-1;t>=0;--t){var r=this.tryEntries[t];if(r.tryLoc===e){var n=r.completion;if("throw"===n.type){var o=n.arg;S(r)}return o}}throw Error("illegal catch attempt")},delegateYield:function(t,r,n){return this.delegate={iterator:N(t),resultName:r,nextLoc:n},"next"===this.method&&(this.arg=e),d}},t}function g(e,t,r,n,o,a,c){try{var i=e[a](c),s=i.value}catch(e){return void r(e)}i.done?t(s):Promise.resolve(s).then(n,o)}function m(e){return function(){var t=this,r=arguments;return new Promise((function(n,o){var a=e.apply(t,r);function c(e){g(a,n,o,c,i,"next",e)}function i(e){g(a,n,o,c,i,"throw",e)}c(void 0)}))}}n=(o.then?(await o)():o)[0],await n.initThreadPool();var a="https://api.explorer.aleo.org/v1",c=new n.AleoKeyProvider,i=new n.ProgramManager(a,c,void 0);c.useCache(!0),self.postMessage({type:"ALEO_WORKER_READY"});var s=null;self.addEventListener("message",(function(e){if("ALEO_EXECUTE_PROGRAM_LOCAL"===e.data.type){var t=e.data,r=t.localProgram,o=t.aleoFunction,u=t.inputs,p=t.privateKey;console.log("Web worker: Executing function locally...");var g=performance.now();m(v().mark((function e(){var t,a,l,f,y,h,m,d,w,E;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:if(e.prev=0,t=n.PrivateKey.from_string(p),a=i.createProgramFromSource(r),l=a.id(),a.hasFunction(o)){e.next=6;break}throw"Program ".concat(l," does not contain function ").concat(o);case 6:if(f="".concat(l,":").concat(o),y=i.networkClient.getProgramImports(r),s===r){e.next=14;break}return e.next=11,i.synthesizeKeys(r,o,u,t);case 11:h=e.sent,i.keyProvider.cacheKeys(f,h),s=r;case 14:return m=new n.AleoKeyProviderParams({cacheKey:f}),e.next=17,i.run(r,o,u,!1,y,m,void 0,void 0,t,void 0);case 17:d=e.sent,console.log("Web worker: Local execution completed in ".concat(performance.now()-g," ms")),w=d.getOutputs(),(E=d.getExecution())?(n.verifyFunctionExecution(E,c.getKeys(f)[1],a,"hello"),E=E.toString(),console.log("Execution verified successfully: "+E)):E="",console.log("Function execution response: ".concat(w)),self.postMessage({type:"OFFLINE_EXECUTION_COMPLETED",outputs:{outputs:w,execution:E}}),e.next=30;break;case 26:e.prev=26,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 30:case"end":return e.stop()}}),e,null,[[0,26]])})))()}else if("ALEO_EXECUTE_PROGRAM_ON_CHAIN"===e.data.type){var d=e.data,w=d.remoteProgram,E=d.aleoFunction,b=d.inputs,x=d.privateKey,k=d.fee,O=d.privateFee,P=d.feeRecord,_=d.url;console.log("Web worker: Creating execution...");var L=performance.now();m(v().mark((function e(){var t,r,o,c,s,u,l;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(x),e.next=4,i.networkClient.getProgramObject(w);case 4:if(r=e.sent,o=r.id(),r.hasFunction(E)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(E);case 8:if(c="".concat(o,":").concat(E),i.keyProvider.containsKeys(c)){e.next=15;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(E,"'")),e.next=13,i.synthesizeKeys(w,E,b,t);case 13:s=e.sent,i.keyProvider.cacheKeys(c,s);case 15:return u=new n.AleoKeyProviderParams({cacheKey:c}),"string"==typeof _&&i.setHost(_),e.next=19,i.execute({programName:o,functionName:E,fee:k,privateFee:O,inputs:b,keySearchParams:u,feeRecord:P,privateKey:t});case 19:l=e.sent,console.log("Web worker: On-chain execution transaction created in ".concat(performance.now()-L," ms")),self.postMessage({type:"EXECUTION_TRANSACTION_COMPLETED",executeTransaction:l}),e.next=28;break;case 24:e.prev=24,e.t0=e.catch(0),console.error("Error creating execution transaction: ".concat(e.t0)),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 28:return e.prev=28,i.setHost(a),e.finish(28);case 31:case"end":return e.stop()}}),e,null,[[0,24,28,31]])})))()}else if("ALEO_ESTIMATE_EXECUTION_FEE"===e.data.type){var T=e.data,R=T.remoteProgram,M=T.privateKey,S=T.aleoFunction,A=T.inputs,N=T.url;console.log("Web worker: Estimating execution fee...");var C=performance.now();m(v().mark((function e(){var t,r,o,a,c,s,u,p,g,m,d;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,t=n.PrivateKey.from_string(M),e.next=4,i.networkClient.getProgramObject(R);case 4:if(r=e.sent,o=r.id(),r.getFunctions().includes(S)){e.next=8;break}throw"Program ".concat(o," does not contain function ").concat(S);case 8:return a="".concat(o,":").concat(S),e.next=11,i.networkClient.getProgramImports(R);case 11:if(c=e.sent,i.keyProvider.containsKeys(a)){e.next=18;break}return console.log("Web worker: Synthesizing proving & verifying keys for: '".concat(o,":").concat(S,"'")),e.next=16,i.synthesizeKeys(r.toString(),S,A,t);case 16:s=e.sent,i.keyProvider.cacheKeys(a,s);case 18:return u=i.keyProvider.getKeys(a),w=2,p=h(v=u)||y(v,w)||f(v,w)||l(),g=p[0],m=p[1],e.next=21,n.ProgramManagerBase.estimateExecutionFee(t,R,S,A,N,c,g,m,void 0);case 21:d=e.sent,console.log("Web worker: Execution fee estimated in ".concat(performance.now()-C," ms")),console.log("Execution Fee Estimation: ".concat(d," microcredits")),self.postMessage({type:"EXECUTION_FEE_ESTIMATION_COMPLETED",executionFee:Number(d)/1e6+.01}),e.next=31;break;case 27:e.prev=27,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 31:case"end":return e.stop()}var v,w}),e,null,[[0,27]])})))()}else if("ALEO_ESTIMATE_DEPLOYMENT_FEE"===e.data.type){var F=e.data,K=F.program;F.url;console.log("Web worker: Estimating deployment fee...");var I=performance.now();m(v().mark((function e(){var t,r;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,e.next=3,i.networkClient.getProgramImports(K);case 3:return t=e.sent,console.log("Estimating deployment fee.."),e.next=7,n.ProgramManagerBase.estimateDeploymentFee(K,t);case 7:r=e.sent,console.log("Web worker: Deployment fee estimation completed in ".concat(performance.now()-I," ms")),console.log("Deployment Fee Estimation: ".concat(r," microcredits")),self.postMessage({type:"DEPLOYMENT_FEE_ESTIMATION_COMPLETED",deploymentFee:Number(r)/1e6+.01}),e.next=17;break;case 13:e.prev=13,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 17:case"end":return e.stop()}}),e,null,[[0,13]])})))()}else if("ALEO_TRANSFER"===e.data.type){var j=e.data,W=j.privateKey,D=j.amountCredits,H=j.recipient,G=j.transfer_type,U=j.amountRecord,Y=j.fee,X=j.privateFee,z=j.feeRecord,J=j.url;console.log("Web worker: Creating transfer of type ".concat(G,"..."));var B=performance.now();m(v().mark((function e(){var t;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof J&&i.setHost(J),e.next=4,i.transfer(D,H,G,Y,X,void 0,U,z,n.PrivateKey.from_string(W),void 0);case 4:t=e.sent,console.log("Web worker: Transfer transaction ".concat(t," created in ").concat(performance.now()-B," ms")),self.postMessage({type:"TRANSFER_TRANSACTION_COMPLETED",transferTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.error(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,i.setHost(a),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_DEPLOY"===e.data.type){var $=e.data,q=$.program,Q=$.privateKey,V=$.fee,Z=$.privateFee,ee=$.feeRecord,te=$.url;console.log("Web worker: Creating deployment...");var re=performance.now();m(v().mark((function e(){var t,r,o;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof te&&i.setHost(te),t=i.createProgramFromSource(q),r=!1,e.prev=4,e.next=7,i.networkClient.getProgram(t.id());case 7:r=!0,e.next=13;break;case 10:e.prev=10,e.t0=e.catch(4),console.log("Program not found on the Aleo Network - proceeding with deployment...");case 13:if(!r){e.next=15;break}throw"Program ".concat(t.id()," already exists on the network");case 15:return console.log("fee is: ",V),e.next=18,i.deploy(q,V,Z,void 0,ee,n.PrivateKey.from_string(Q));case 18:o=e.sent,console.log("Web worker: Deployment transaction ".concat(o," created in ").concat(performance.now()-re," ms")),self.postMessage({type:"DEPLOY_TRANSACTION_COMPLETED",deployTransaction:o}),e.next=27;break;case 23:e.prev=23,e.t1=e.catch(0),console.log(e.t1),self.postMessage({type:"ERROR",errorMessage:e.t1.toString()});case 27:return e.prev=27,i.setHost(a),e.finish(27);case 30:case"end":return e.stop()}}),e,null,[[0,23,27,30],[4,10]])})))()}else if("ALEO_SPLIT"===e.data.type){var ne=e.data,oe=ne.splitAmount,ae=ne.record,ce=ne.privateKey,ie=ne.url;console.log("Web worker: Creating split...");var se=performance.now();m(v().mark((function e(){var t;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof ie&&i.setHost(ie),e.next=4,i.split(oe,ae,n.PrivateKey.from_string(ce),void 0);case 4:t=e.sent,console.log("Web worker: Split transaction ".concat(t," created in ").concat(performance.now()-se," ms")),self.postMessage({type:"SPLIT_TRANSACTION_COMPLETED",splitTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,i.setHost(a),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}else if("ALEO_JOIN"===e.data.type){var ue=e.data,le=ue.recordOne,fe=ue.recordTwo,pe=ue.fee,ye=ue.privateFee,he=ue.feeRecord,ve=ue.privateKey,ge=ue.url;console.log("Web worker: Creating join...");var me=performance.now();m(v().mark((function e(){var t;return v().wrap((function(e){for(;;)switch(e.prev=e.next){case 0:return e.prev=0,"string"==typeof ge&&i.setHost(ge),e.next=4,i.join(le,fe,pe,ye,void 0,he,n.PrivateKey.from_string(ve),void 0);case 4:t=e.sent,console.log("Web worker: Join transaction ".concat(t," created in ").concat(performance.now()-me," ms")),self.postMessage({type:"JOIN_TRANSACTION_COMPLETED",joinTransaction:t}),e.next=13;break;case 9:e.prev=9,e.t0=e.catch(0),console.log(e.t0),self.postMessage({type:"ERROR",errorMessage:e.t0.toString()});case 13:return e.prev=13,i.setHost(a),e.finish(13);case 16:case"end":return e.stop()}}),e,null,[[0,9,13,16]])})))()}})),t()}catch(d){t(d)}}),1)}}]); +//# sourceMappingURL=66.bundle.js.map \ No newline at end of file diff --git a/66.bundle.js.LICENSE.txt b/66.bundle.js.LICENSE.txt new file mode 100644 index 000000000..ae386fb79 --- /dev/null +++ b/66.bundle.js.LICENSE.txt @@ -0,0 +1 @@ +/*! regenerator-runtime -- Copyright (c) 2014-present, Facebook, Inc. -- license (MIT): https://github.com/facebook/regenerator/blob/main/LICENSE */ diff --git a/66.bundle.js.map b/66.bundle.js.map new file mode 100644 index 000000000..9650655c8 --- /dev/null +++ b/66.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"66.bundle.js","mappings":";u1CACAA,EAAA,kBAAAC,CAAA,MAAAC,EAAAD,EAAA,GAAAE,EAAAC,OAAAC,UAAAC,EAAAH,EAAAI,eAAAC,EAAAJ,OAAAK,gBAAA,SAAAP,EAAAD,EAAAE,GAAAD,EAAAD,GAAAE,EAAAO,KAAA,EAAAC,EAAA,mBAAAC,OAAAA,OAAA,GAAAC,EAAAF,EAAAG,UAAA,aAAAC,EAAAJ,EAAAK,eAAA,kBAAAC,EAAAN,EAAAO,aAAA,yBAAAC,EAAAjB,EAAAD,EAAAE,GAAA,OAAAC,OAAAK,eAAAP,EAAAD,EAAA,CAAAS,MAAAP,EAAAiB,YAAA,EAAAC,cAAA,EAAAC,UAAA,IAAApB,EAAAD,EAAA,KAAAkB,EAAA,aAAAjB,GAAAiB,EAAA,SAAAjB,EAAAD,EAAAE,GAAA,OAAAD,EAAAD,GAAAE,CAAA,WAAAoB,EAAArB,EAAAD,EAAAE,EAAAG,GAAA,IAAAK,EAAAV,GAAAA,EAAAI,qBAAAmB,EAAAvB,EAAAuB,EAAAX,EAAAT,OAAAqB,OAAAd,EAAAN,WAAAU,EAAA,IAAAW,EAAApB,GAAA,WAAAE,EAAAK,EAAA,WAAAH,MAAAiB,EAAAzB,EAAAC,EAAAY,KAAAF,CAAA,UAAAe,EAAA1B,EAAAD,EAAAE,GAAA,WAAA0B,KAAA,SAAAC,IAAA5B,EAAA6B,KAAA9B,EAAAE,GAAA,OAAAD,GAAA,OAAA2B,KAAA,QAAAC,IAAA5B,EAAA,EAAAD,EAAAsB,KAAAA,EAAA,IAAAS,EAAA,iBAAAC,EAAA,iBAAAC,EAAA,YAAAC,EAAA,YAAAC,EAAA,YAAAZ,IAAA,UAAAa,IAAA,UAAAC,IAAA,KAAAC,EAAA,GAAApB,EAAAoB,EAAA1B,GAAA,8BAAA2B,EAAApC,OAAAqC,eAAAC,EAAAF,GAAAA,EAAAA,EAAAG,EAAA,MAAAD,GAAAA,IAAAvC,GAAAG,EAAAyB,KAAAW,EAAA7B,KAAA0B,EAAAG,GAAA,IAAAE,EAAAN,EAAAjC,UAAAmB,EAAAnB,UAAAD,OAAAqB,OAAAc,GAAA,SAAAM,EAAA3C,GAAA,0BAAA4C,SAAA,SAAA7C,GAAAkB,EAAAjB,EAAAD,GAAA,SAAAC,GAAA,YAAA6C,QAAA9C,EAAAC,EAAA,gBAAA8C,EAAA9C,EAAAD,GAAA,SAAAgD,EAAA9C,EAAAK,EAAAG,EAAAE,GAAA,IAAAE,EAAAa,EAAA1B,EAAAC,GAAAD,EAAAM,GAAA,aAAAO,EAAAc,KAAA,KAAAZ,EAAAF,EAAAe,IAAAE,EAAAf,EAAAP,MAAA,OAAAsB,GAAA,UAAAkB,EAAAlB,IAAA1B,EAAAyB,KAAAC,EAAA,WAAA/B,EAAAkD,QAAAnB,EAAAoB,SAAAC,MAAA,SAAAnD,GAAA+C,EAAA,OAAA/C,EAAAS,EAAAE,EAAA,aAAAX,GAAA+C,EAAA,QAAA/C,EAAAS,EAAAE,EAAA,IAAAZ,EAAAkD,QAAAnB,GAAAqB,MAAA,SAAAnD,GAAAe,EAAAP,MAAAR,EAAAS,EAAAM,EAAA,aAAAf,GAAA,OAAA+C,EAAA,QAAA/C,EAAAS,EAAAE,EAAA,IAAAA,EAAAE,EAAAe,IAAA,KAAA3B,EAAAK,EAAA,gBAAAE,MAAA,SAAAR,EAAAI,GAAA,SAAAgD,IAAA,WAAArD,GAAA,SAAAA,EAAAE,GAAA8C,EAAA/C,EAAAI,EAAAL,EAAAE,EAAA,WAAAA,EAAAA,EAAAA,EAAAkD,KAAAC,EAAAA,GAAAA,GAAA,aAAA3B,EAAA1B,EAAAE,EAAAG,GAAA,IAAAE,EAAAwB,EAAA,gBAAArB,EAAAE,GAAA,GAAAL,IAAA0B,EAAA,MAAAqB,MAAA,mCAAA/C,IAAA2B,EAAA,cAAAxB,EAAA,MAAAE,EAAA,OAAAH,MAAAR,EAAAsD,MAAA,OAAAlD,EAAAmD,OAAA9C,EAAAL,EAAAwB,IAAAjB,IAAA,KAAAE,EAAAT,EAAAoD,SAAA,GAAA3C,EAAA,KAAAE,EAAA0C,EAAA5C,EAAAT,GAAA,GAAAW,EAAA,IAAAA,IAAAmB,EAAA,gBAAAnB,CAAA,cAAAX,EAAAmD,OAAAnD,EAAAsD,KAAAtD,EAAAuD,MAAAvD,EAAAwB,SAAA,aAAAxB,EAAAmD,OAAA,IAAAjD,IAAAwB,EAAA,MAAAxB,EAAA2B,EAAA7B,EAAAwB,IAAAxB,EAAAwD,kBAAAxD,EAAAwB,IAAA,gBAAAxB,EAAAmD,QAAAnD,EAAAyD,OAAA,SAAAzD,EAAAwB,KAAAtB,EAAA0B,EAAA,IAAAK,EAAAX,EAAA3B,EAAAE,EAAAG,GAAA,cAAAiC,EAAAV,KAAA,IAAArB,EAAAF,EAAAkD,KAAArB,EAAAF,EAAAM,EAAAT,MAAAM,EAAA,gBAAA1B,MAAA6B,EAAAT,IAAA0B,KAAAlD,EAAAkD,KAAA,WAAAjB,EAAAV,OAAArB,EAAA2B,EAAA7B,EAAAmD,OAAA,QAAAnD,EAAAwB,IAAAS,EAAAT,IAAA,YAAA6B,EAAA1D,EAAAE,GAAA,IAAAG,EAAAH,EAAAsD,OAAAjD,EAAAP,EAAAa,SAAAR,GAAA,GAAAE,IAAAN,EAAA,OAAAC,EAAAuD,SAAA,eAAApD,GAAAL,EAAAa,SAAA,SAAAX,EAAAsD,OAAA,SAAAtD,EAAA2B,IAAA5B,EAAAyD,EAAA1D,EAAAE,GAAA,UAAAA,EAAAsD,SAAA,WAAAnD,IAAAH,EAAAsD,OAAA,QAAAtD,EAAA2B,IAAA,IAAAkC,UAAA,oCAAA1D,EAAA,aAAA8B,EAAA,IAAAzB,EAAAiB,EAAApB,EAAAP,EAAAa,SAAAX,EAAA2B,KAAA,aAAAnB,EAAAkB,KAAA,OAAA1B,EAAAsD,OAAA,QAAAtD,EAAA2B,IAAAnB,EAAAmB,IAAA3B,EAAAuD,SAAA,KAAAtB,EAAA,IAAAvB,EAAAF,EAAAmB,IAAA,OAAAjB,EAAAA,EAAA2C,MAAArD,EAAAF,EAAAgE,YAAApD,EAAAH,MAAAP,EAAA+D,KAAAjE,EAAAkE,QAAA,WAAAhE,EAAAsD,SAAAtD,EAAAsD,OAAA,OAAAtD,EAAA2B,IAAA5B,GAAAC,EAAAuD,SAAA,KAAAtB,GAAAvB,GAAAV,EAAAsD,OAAA,QAAAtD,EAAA2B,IAAA,IAAAkC,UAAA,oCAAA7D,EAAAuD,SAAA,KAAAtB,EAAA,UAAAgC,EAAAlE,GAAA,IAAAD,EAAA,CAAAoE,OAAAnE,EAAA,SAAAA,IAAAD,EAAAqE,SAAApE,EAAA,SAAAA,IAAAD,EAAAsE,WAAArE,EAAA,GAAAD,EAAAuE,SAAAtE,EAAA,SAAAuE,WAAAC,KAAAzE,EAAA,UAAA0E,EAAAzE,GAAA,IAAAD,EAAAC,EAAA0E,YAAA,GAAA3E,EAAA4B,KAAA,gBAAA5B,EAAA6B,IAAA5B,EAAA0E,WAAA3E,CAAA,UAAAyB,EAAAxB,GAAA,KAAAuE,WAAA,EAAAJ,OAAA,SAAAnE,EAAA4C,QAAAsB,EAAA,WAAAS,OAAA,YAAAlC,EAAA1C,GAAA,GAAAA,GAAA,KAAAA,EAAA,KAAAE,EAAAF,EAAAY,GAAA,GAAAV,EAAA,OAAAA,EAAA4B,KAAA9B,GAAA,sBAAAA,EAAAiE,KAAA,OAAAjE,EAAA,IAAA6E,MAAA7E,EAAA8E,QAAA,KAAAvE,GAAA,EAAAG,EAAA,SAAAuD,IAAA,OAAA1D,EAAAP,EAAA8E,QAAA,GAAAzE,EAAAyB,KAAA9B,EAAAO,GAAA,OAAA0D,EAAAxD,MAAAT,EAAAO,GAAA0D,EAAAV,MAAA,EAAAU,EAAA,OAAAA,EAAAxD,MAAAR,EAAAgE,EAAAV,MAAA,EAAAU,CAAA,SAAAvD,EAAAuD,KAAAvD,CAAA,YAAAqD,UAAAd,EAAAjD,GAAA,2BAAAoC,EAAAhC,UAAAiC,EAAA9B,EAAAoC,EAAA,eAAAlC,MAAA4B,EAAAjB,cAAA,IAAAb,EAAA8B,EAAA,eAAA5B,MAAA2B,EAAAhB,cAAA,IAAAgB,EAAA2C,YAAA7D,EAAAmB,EAAArB,EAAA,qBAAAhB,EAAAgF,oBAAA,SAAA/E,GAAA,IAAAD,EAAA,mBAAAC,GAAAA,EAAAgF,YAAA,QAAAjF,IAAAA,IAAAoC,GAAA,uBAAApC,EAAA+E,aAAA/E,EAAAkF,MAAA,EAAAlF,EAAAmF,KAAA,SAAAlF,GAAA,OAAAE,OAAAiF,eAAAjF,OAAAiF,eAAAnF,EAAAoC,IAAApC,EAAAoF,UAAAhD,EAAAnB,EAAAjB,EAAAe,EAAA,sBAAAf,EAAAG,UAAAD,OAAAqB,OAAAmB,GAAA1C,CAAA,EAAAD,EAAAsF,MAAA,SAAArF,GAAA,OAAAkD,QAAAlD,EAAA,EAAA2C,EAAAG,EAAA3C,WAAAc,EAAA6B,EAAA3C,UAAAU,GAAA,0BAAAd,EAAA+C,cAAAA,EAAA/C,EAAAuF,MAAA,SAAAtF,EAAAC,EAAAG,EAAAE,EAAAG,QAAA,IAAAA,IAAAA,EAAA8E,SAAA,IAAA5E,EAAA,IAAAmC,EAAAzB,EAAArB,EAAAC,EAAAG,EAAAE,GAAAG,GAAA,OAAAV,EAAAgF,oBAAA9E,GAAAU,EAAAA,EAAAqD,OAAAb,MAAA,SAAAnD,GAAA,OAAAA,EAAAsD,KAAAtD,EAAAQ,MAAAG,EAAAqD,MAAA,KAAArB,EAAAD,GAAAzB,EAAAyB,EAAA3B,EAAA,aAAAE,EAAAyB,EAAA/B,GAAA,0BAAAM,EAAAyB,EAAA,qDAAA3C,EAAAyF,KAAA,SAAAxF,GAAA,IAAAD,EAAAG,OAAAF,GAAAC,EAAA,WAAAG,KAAAL,EAAAE,EAAAuE,KAAApE,GAAA,OAAAH,EAAAwF,UAAA,SAAAzB,IAAA,KAAA/D,EAAA4E,QAAA,KAAA7E,EAAAC,EAAAyF,MAAA,GAAA1F,KAAAD,EAAA,OAAAiE,EAAAxD,MAAAR,EAAAgE,EAAAV,MAAA,EAAAU,CAAA,QAAAA,EAAAV,MAAA,EAAAU,CAAA,GAAAjE,EAAA0C,OAAAA,EAAAjB,EAAArB,UAAA,CAAA6E,YAAAxD,EAAAmD,MAAA,SAAA5E,GAAA,QAAA4F,KAAA,OAAA3B,KAAA,OAAAN,KAAA,KAAAC,MAAA3D,EAAA,KAAAsD,MAAA,OAAAE,SAAA,UAAAD,OAAA,YAAA3B,IAAA5B,EAAA,KAAAuE,WAAA3B,QAAA6B,IAAA1E,EAAA,QAAAE,KAAA,WAAAA,EAAA2F,OAAA,IAAAxF,EAAAyB,KAAA,KAAA5B,KAAA2E,OAAA3E,EAAA4F,MAAA,WAAA5F,GAAAD,EAAA,EAAA8F,KAAA,gBAAAxC,MAAA,MAAAtD,EAAA,KAAAuE,WAAA,GAAAG,WAAA,aAAA1E,EAAA2B,KAAA,MAAA3B,EAAA4B,IAAA,YAAAmE,IAAA,EAAAnC,kBAAA,SAAA7D,GAAA,QAAAuD,KAAA,MAAAvD,EAAA,IAAAE,EAAA,cAAA+F,EAAA5F,EAAAE,GAAA,OAAAK,EAAAgB,KAAA,QAAAhB,EAAAiB,IAAA7B,EAAAE,EAAA+D,KAAA5D,EAAAE,IAAAL,EAAAsD,OAAA,OAAAtD,EAAA2B,IAAA5B,KAAAM,CAAA,SAAAA,EAAA,KAAAiE,WAAAM,OAAA,EAAAvE,GAAA,IAAAA,EAAA,KAAAG,EAAA,KAAA8D,WAAAjE,GAAAK,EAAAF,EAAAiE,WAAA,YAAAjE,EAAA0D,OAAA,OAAA6B,EAAA,UAAAvF,EAAA0D,QAAA,KAAAwB,KAAA,KAAA9E,EAAAT,EAAAyB,KAAApB,EAAA,YAAAM,EAAAX,EAAAyB,KAAApB,EAAA,iBAAAI,GAAAE,EAAA,SAAA4E,KAAAlF,EAAA2D,SAAA,OAAA4B,EAAAvF,EAAA2D,UAAA,WAAAuB,KAAAlF,EAAA4D,WAAA,OAAA2B,EAAAvF,EAAA4D,WAAA,SAAAxD,GAAA,QAAA8E,KAAAlF,EAAA2D,SAAA,OAAA4B,EAAAvF,EAAA2D,UAAA,YAAArD,EAAA,MAAAsC,MAAA,kDAAAsC,KAAAlF,EAAA4D,WAAA,OAAA2B,EAAAvF,EAAA4D,WAAA,KAAAR,OAAA,SAAA7D,EAAAD,GAAA,QAAAE,EAAA,KAAAsE,WAAAM,OAAA,EAAA5E,GAAA,IAAAA,EAAA,KAAAK,EAAA,KAAAiE,WAAAtE,GAAA,GAAAK,EAAA6D,QAAA,KAAAwB,MAAAvF,EAAAyB,KAAAvB,EAAA,oBAAAqF,KAAArF,EAAA+D,WAAA,KAAA5D,EAAAH,EAAA,OAAAG,IAAA,UAAAT,GAAA,aAAAA,IAAAS,EAAA0D,QAAApE,GAAAA,GAAAU,EAAA4D,aAAA5D,EAAA,UAAAE,EAAAF,EAAAA,EAAAiE,WAAA,UAAA/D,EAAAgB,KAAA3B,EAAAW,EAAAiB,IAAA7B,EAAAU,GAAA,KAAA8C,OAAA,YAAAS,KAAAvD,EAAA4D,WAAAnC,GAAA,KAAA+D,SAAAtF,EAAA,EAAAsF,SAAA,SAAAjG,EAAAD,GAAA,aAAAC,EAAA2B,KAAA,MAAA3B,EAAA4B,IAAA,gBAAA5B,EAAA2B,MAAA,aAAA3B,EAAA2B,KAAA,KAAAqC,KAAAhE,EAAA4B,IAAA,WAAA5B,EAAA2B,MAAA,KAAAoE,KAAA,KAAAnE,IAAA5B,EAAA4B,IAAA,KAAA2B,OAAA,cAAAS,KAAA,kBAAAhE,EAAA2B,MAAA5B,IAAA,KAAAiE,KAAAjE,GAAAmC,CAAA,EAAAgE,OAAA,SAAAlG,GAAA,QAAAD,EAAA,KAAAwE,WAAAM,OAAA,EAAA9E,GAAA,IAAAA,EAAA,KAAAE,EAAA,KAAAsE,WAAAxE,GAAA,GAAAE,EAAAoE,aAAArE,EAAA,YAAAiG,SAAAhG,EAAAyE,WAAAzE,EAAAqE,UAAAG,EAAAxE,GAAAiC,CAAA,kBAAAlC,GAAA,QAAAD,EAAA,KAAAwE,WAAAM,OAAA,EAAA9E,GAAA,IAAAA,EAAA,KAAAE,EAAA,KAAAsE,WAAAxE,GAAA,GAAAE,EAAAkE,SAAAnE,EAAA,KAAAI,EAAAH,EAAAyE,WAAA,aAAAtE,EAAAuB,KAAA,KAAArB,EAAAF,EAAAwB,IAAA6C,EAAAxE,EAAA,QAAAK,CAAA,QAAA+C,MAAA,0BAAA8C,cAAA,SAAApG,EAAAE,EAAAG,GAAA,YAAAoD,SAAA,CAAA5C,SAAA6B,EAAA1C,GAAAgE,WAAA9D,EAAAgE,QAAA7D,GAAA,cAAAmD,SAAA,KAAA3B,IAAA5B,GAAAkC,CAAA,GAAAnC,CAAA,UAAAqG,EAAAhG,EAAAJ,EAAAD,EAAAE,EAAAK,EAAAK,EAAAE,GAAA,QAAAJ,EAAAL,EAAAO,GAAAE,GAAAE,EAAAN,EAAAD,KAAA,OAAAJ,GAAA,YAAAL,EAAAK,EAAA,CAAAK,EAAA6C,KAAAtD,EAAAe,GAAAwE,QAAAtC,QAAAlC,GAAAoC,KAAAlD,EAAAK,EAAA,UAAA+F,EAAAjG,GAAA,sBAAAJ,EAAA,KAAAD,EAAAuG,UAAA,WAAAf,SAAA,SAAAtF,EAAAK,GAAA,IAAAK,EAAAP,EAAAmG,MAAAvG,EAAAD,GAAA,SAAAyG,EAAApG,GAAAgG,EAAAzF,EAAAV,EAAAK,EAAAkG,EAAAC,EAAA,OAAArG,EAAA,UAAAqG,EAAArG,GAAAgG,EAAAzF,EAAAV,EAAAK,EAAAkG,EAAAC,EAAA,QAAArG,EAAA,CAAAoG,OAAA,yCACME,EAAAA,iBAEN,IAAMC,EAAc,mCACdC,EAAc,IAAIF,EAAAA,gBAClBG,EAAiB,IAAIH,EAAAA,eAAoBC,EAAaC,OAAaE,GACzEF,EAAYG,UAAS,GAErBC,KAAKC,YAAY,CACbtF,KAAM,sBAGV,IAAIuF,EAAmB,KACvBF,KAAKG,iBAAiB,WAAW,SAACC,GAC9B,GAAqB,+BAAjBA,EAAGC,KAAK1F,KAAuC,CAC/C,IAAA2F,EAA2DF,EAAGC,KAAtDE,EAAYD,EAAZC,aAAcC,EAAYF,EAAZE,aAAcC,EAAMH,EAANG,OAAQC,EAAUJ,EAAVI,WAE5CC,QAAQC,IAAI,6CACZ,IAAIC,EAAYC,YAAYC,MAE5B1B,EAAAvG,IAAAoF,MAAC,SAAA8C,IAAA,IAAAC,EAAAC,EAAAC,EAAAC,EAAAC,EAAA7C,EAAA8C,EAAAC,EAAAC,EAAAC,EAAA,OAAA3I,IAAAuB,MAAA,SAAAqH,GAAA,cAAAA,EAAA/C,KAAA+C,EAAA1E,MAAA,OAKsC,GALtC0E,EAAA/C,KAAA,EAEasC,EAAmBvB,EAAAA,WAAgBiC,YAAYjB,GAE/CQ,EAAUrB,EAAe+B,wBAAwBrB,GACjDY,EAAaD,EAAQW,KACtBX,EAAQY,YAAYtB,GAAe,CAAFkB,EAAA1E,KAAA,wBAAA+E,OACjBZ,EAAU,+BAAAY,OAA8BvB,GAAY,OAOzE,GALMY,EAAW,GAAHW,OAAMZ,EAAU,KAAAY,OAAIvB,GAG5Ba,EAAUxB,EAAemC,cAAcC,kBAAkB1B,GAG3DL,IAAqBK,EAAY,CAAAmB,EAAA1E,KAAA,gBAAA0E,EAAA1E,KAAA,GACd6C,EAAeqC,eAAe3B,EAAcC,EAAcC,EAAQQ,GAAiB,QAAhGzC,EAAIkD,EAAAhF,KACVmD,EAAeD,YAAYuC,UAAUf,EAAU5C,GAC/C0B,EAAmBK,EAAa,QAMpC,OAFMe,EAAY,IAAI5B,EAAAA,sBAA2B,CAAC,SAAY0B,IAE9DM,EAAA1E,KAAA,GACqB6C,EAAeuC,IAChC7B,EACAC,EACAC,GACA,EACAY,EACAC,OACAxB,OACAA,EACAmB,OACAnB,GACH,QAXGyB,EAAQG,EAAAhF,KAcZiE,QAAQC,IAAI,4CAADmB,OAA6CjB,YAAYC,MAAQF,EAAS,QAC/EW,EAAUD,EAASc,cACrBZ,EAAYF,EAASe,iBAErB5C,EAAAA,wBAA6B+B,EAAW7B,EAAY2C,QAAQnB,GAAU,GAAIF,EAAS,SACnFO,EAAYA,EAAUe,WACtB7B,QAAQC,IAAI,oCAAsCa,IAElDA,EAAY,GAGhBd,QAAQC,IAAI,gCAADmB,OAAiCP,IAC5CxB,KAAKC,YAAY,CACbtF,KAAM,8BACN6G,QAAS,CAACA,QAASA,EAASC,UAAWA,KACxCC,EAAA1E,KAAA,iBAAA0E,EAAA/C,KAAA,GAAA+C,EAAAe,GAAAf,EAAA,SAEHf,QAAQ+B,MAAKhB,EAAAe,IACbzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAcjB,EAAAe,GAAMD,aACrB,yBAAAd,EAAA5C,OAAA,GAAAkC,EAAA,kBA5DX3B,EA+DJ,MAAO,GAAqB,kCAAjBe,EAAGC,KAAK1F,KAA0C,CACzD,IAAAiI,EASIxC,EAAGC,KARHwC,EAAaD,EAAbC,cACArC,EAAYoC,EAAZpC,aACAC,EAAMmC,EAANnC,OACAC,EAAUkC,EAAVlC,WACAoC,EAAGF,EAAHE,IACAC,EAAUH,EAAVG,WACAC,EAASJ,EAATI,UACAC,EAAGL,EAAHK,IAGJtC,QAAQC,IAAI,qCACZ,IAAIC,EAAYC,YAAYC,MAE5B1B,EAAAvG,IAAAoF,MAAC,SAAAgF,IAAA,IAAAjC,EAAAC,EAAAC,EAAAC,EAAA5C,EAAA8C,EAAA6B,EAAA,OAAArK,IAAAuB,MAAA,SAAA+I,GAAA,cAAAA,EAAAzE,KAAAyE,EAAApG,MAAA,OAGO,OAHPoG,EAAAzE,KAAA,EAEasC,EAAmBvB,EAAAA,WAAgBiC,YAAYjB,GACrD0C,EAAApG,KAAA,EACsB6C,EAAemC,cAAcqB,iBAAiBR,GAAc,OACnD,GADzB3B,EAAOkC,EAAA1G,KACPyE,EAAaD,EAAQW,KACtBX,EAAQY,YAAYtB,GAAe,CAAF4C,EAAApG,KAAA,wBAAA+E,OACjBZ,EAAU,+BAAAY,OAA8BvB,GAAY,OAI3B,GAAxCY,EAAW,GAAHW,OAAMZ,EAAU,KAAAY,OAAIvB,GAC7BX,EAAeD,YAAY0D,aAAalC,GAAW,CAAFgC,EAAApG,KAAA,SACoD,OAAtG2D,QAAQC,IAAI,2DAADmB,OAA4DZ,EAAU,KAAAY,OAAIvB,EAAY,MAAK4C,EAAApG,KAAA,GACnF6C,EAAeqC,eAAeW,EAAerC,EAAcC,EAAQQ,GAAiB,QAAjGzC,EAAI4E,EAAA1G,KACVmD,EAAeD,YAAYuC,UAAUf,EAAU5C,GAAM,QAOI,OAHvD8C,EAAY,IAAI5B,EAAAA,sBAA2B,CAAC,SAAY0B,IAG3C,iBAAR6B,GAAoBpD,EAAe0D,QAAQN,GAAOG,EAAApG,KAAA,GACnC6C,EAAe2D,QAAQ,CAC7CC,YAAatC,EACbuC,aAAclD,EACdsC,IAAKA,EACLC,WAAYA,EACZtC,OAAQA,EACRkD,gBAAiBrC,EACjB0B,UAAWA,EACXtC,WAAYO,IACd,QATIkC,EAAWC,EAAA1G,KAYjBiE,QAAQC,IAAI,yDAADmB,OAA0DjB,YAAYC,MAAQF,EAAS,QAClGb,KAAKC,YAAY,CACbtF,KAAM,kCACNiJ,mBAAoBT,IACrBC,EAAApG,KAAA,iBAAAoG,EAAAzE,KAAA,GAAAyE,EAAAX,GAAAW,EAAA,SAEHzC,QAAQ+B,MAAM,yCAADX,OAAAqB,EAAAX,KACbzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAcS,EAAAX,GAAMD,aACrB,QAEiC,OAFjCY,EAAAzE,KAAA,GAEHkB,EAAe0D,QAAQ5D,GAAayD,EAAAlE,OAAA,6BAAAkE,EAAAtE,OAAA,GAAAoE,EAAA,wBA/C5C7D,EAkDJ,MAAO,GAAqB,gCAAjBe,EAAGC,KAAK1F,KAAwC,CACvD,IAAAkJ,EACIzD,EAAGC,KADCwC,EAAagB,EAAbhB,cAAenC,EAAUmD,EAAVnD,WAAYF,EAAYqD,EAAZrD,aAAcC,EAAMoD,EAANpD,OAAQwC,EAAGY,EAAHZ,IAGzDtC,QAAQC,IAAI,2CACZ,IAAIC,EAAYC,YAAYC,MAE5B1B,EAAAvG,IAAAoF,MAAC,SAAA4F,IAAA,IAAA7C,EAAAC,EAAAC,EAAAC,EAAAC,EAAA7C,EAAAuF,EAAAC,EAAAC,EAAAC,EAAAC,EAAA,OAAArL,IAAAuB,MAAA,SAAA+J,GAAA,cAAAA,EAAAzF,KAAAyF,EAAApH,MAAA,OAGO,OAHPoH,EAAAzF,KAAA,EAEasC,EAAmBvB,EAAAA,WAAgBiC,YAAYjB,GACrD0D,EAAApH,KAAA,EACsB6C,EAAemC,cAAcqB,iBAAiBR,GAAc,OACnD,GADzB3B,EAAOkD,EAAA1H,KACPyE,EAAaD,EAAQW,KACtBX,EAAQmD,eAAeC,SAAS9D,GAAe,CAAF4D,EAAApH,KAAA,wBAAA+E,OAC7BZ,EAAU,+BAAAY,OAA8BvB,GAAY,OAE3B,OAAxCY,EAAW,GAAHW,OAAMZ,EAAU,KAAAY,OAAIvB,GAAY4D,EAAApH,KAAA,GACxB6C,EAAemC,cAAcC,kBAAkBY,GAAc,QAAtE,GAAPxB,EAAO+C,EAAA1H,KAGRmD,EAAeD,YAAY0D,aAAalC,GAAW,CAAFgD,EAAApH,KAAA,SACoD,OAAtG2D,QAAQC,IAAI,2DAADmB,OAA4DZ,EAAU,KAAAY,OAAIvB,EAAY,MAAK4D,EAAApH,KAAA,GACnF6C,EAAeqC,eAAehB,EAAQsB,WAAYhC,EAAcC,EAAQQ,GAAiB,QAAtGzC,EAAI4F,EAAA1H,KACVmD,EAAeD,YAAYuC,UAAUf,EAAU5C,GAAM,QAI1B,OAD/BuF,EACmClE,EAAeD,YAAY2C,QAAQnB,KAAS,EAAA4C,MAAAD,wBAAxEE,EAAUD,EAAA,GAAEE,EAAYF,EAAA,GAAAI,EAAApH,KAAA,GACR0C,EAAAA,mBAAwB6E,qBAC3CtD,EACA4B,EACArC,EACAC,EACAwC,EACA5B,EACA4C,EACAC,OACApE,GACH,QAVGqE,EAAUC,EAAA1H,KAadiE,QAAQC,IAAI,0CAADmB,OAA2CjB,YAAYC,MAAQF,EAAS,QACnFF,QAAQC,IAAI,6BAADmB,OAA8BoC,EAAU,kBACnDnE,KAAKC,YAAY,CACbtF,KAAM,qCACN6J,aAAcC,OAAON,GAAc,IAAU,MAC9CC,EAAApH,KAAA,iBAAAoH,EAAAzF,KAAA,GAAAyF,EAAA3B,GAAA2B,EAAA,SAEHzD,QAAQ+B,MAAK0B,EAAA3B,IACbzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAcyB,EAAA3B,GAAMD,aACrB,yBAAA4B,EAAAtF,cAAA,GAAAgF,EAAA,kBA7CXzE,EAgDJ,MAAO,GAAqB,iCAAjBe,EAAGC,KAAK1F,KAAyC,CACxD,IAAA+J,EAAyBtE,EAAGC,KAApBa,EAAOwD,EAAPxD,QAAYwD,EAAHzB,IAEjBtC,QAAQC,IAAI,4CAEZ,IAAIC,EAAYC,YAAYC,MAC5B1B,EAAAvG,IAAAoF,MAAC,SAAAyG,IAAA,IAAAtD,EAAAuD,EAAA,OAAA9L,IAAAuB,MAAA,SAAAwK,GAAA,cAAAA,EAAAlG,KAAAkG,EAAA7H,MAAA,cAAA6H,EAAAlG,KAAA,EAAAkG,EAAA7H,KAAA,EAE6B6C,EAAemC,cAAcC,kBAAkBf,GAAQ,OAClC,OADrCG,EAAOwD,EAAAnI,KACbiE,QAAQC,IAAI,+BAA+BiE,EAAA7H,KAAA,EAEjC0C,EAAAA,mBAAwBoF,sBAC1B5D,EACAG,GACH,OAJDuD,EAAaC,EAAAnI,KAOjBiE,QAAQC,IAAI,sDAADmB,OAAuDjB,YAAYC,MAAQF,EAAS,QAC/FF,QAAQC,IAAI,8BAADmB,OAA+B6C,EAAa,kBACvD5E,KAAKC,YAAY,CACbtF,KAAM,sCACNiK,cAAeH,OAAOG,GAAiB,IAAU,MAClDC,EAAA7H,KAAA,iBAAA6H,EAAAlG,KAAA,GAAAkG,EAAApC,GAAAoC,EAAA,SAEHlE,QAAQ+B,MAAKmC,EAAApC,IACbzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAckC,EAAApC,GAAMD,aACrB,yBAAAqC,EAAA/F,OAAA,GAAA6F,EAAA,kBAtBXtF,EAyBJ,MAAO,GAAqB,kBAAjBe,EAAGC,KAAK1F,KAA0B,CACzC,IAAAoK,EAUI3E,EAAGC,KATHK,EAAUqE,EAAVrE,WACAsE,EAAaD,EAAbC,cACAC,EAASF,EAATE,UACAC,EAAaH,EAAbG,cACAC,EAAYJ,EAAZI,aACArC,EAAGiC,EAAHjC,IACAC,EAAUgC,EAAVhC,WACAC,EAAS+B,EAAT/B,UACAC,EAAG8B,EAAH9B,IAGJtC,QAAQC,IAAI,yCAADmB,OACkCmD,EAAa,QAE1D,IAAIrE,EAAYC,YAAYC,MAE5B1B,EAAAvG,IAAAoF,MAAC,SAAAkH,IAAA,IAAAjC,EAAA,OAAArK,IAAAuB,MAAA,SAAAgL,GAAA,cAAAA,EAAA1G,KAAA0G,EAAArI,MAAA,OAKO,OALPqI,EAAA1G,KAAA,EAG0B,iBAARsE,GAAoBpD,EAAe0D,QAAQN,GAEtDoC,EAAArI,KAAA,EAC0B6C,EAAeyF,SACrCN,EACAC,EACAC,EACApC,EACAC,OACAjD,EACAqF,EACAnC,EACAtD,EAAAA,WAAgBiC,YAAYjB,QAC5BZ,GACH,OAXKqD,EAAWkC,EAAA3I,KAcjBiE,QAAQC,IAAI,oCAADmB,OAAqCoB,EAAW,gBAAApB,OAAejB,YAAYC,MAAQF,EAAS,QACvGb,KAAKC,YAAY,CACbtF,KAAM,iCACN4K,oBAAqBpC,IACtBkC,EAAArI,KAAA,gBAAAqI,EAAA1G,KAAA,EAAA0G,EAAA5C,GAAA4C,EAAA,SAEH1E,QAAQ+B,MAAK2C,EAAA5C,IACbzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAc0C,EAAA5C,GAAMD,aACrB,QAEiC,OAFjC6C,EAAA1G,KAAA,GAEHkB,EAAe0D,QAAQ5D,GAAa0F,EAAAnG,OAAA,6BAAAmG,EAAAvG,OAAA,GAAAsG,EAAA,uBAhC5C/F,EAmCJ,MAAO,GAAqB,gBAAjBe,EAAGC,KAAK1F,KAAwB,CACvC,IAAA6K,EAAiEpF,EAAGC,KAA5Da,EAAOsE,EAAPtE,QAASR,EAAU8E,EAAV9E,WAAYoC,EAAG0C,EAAH1C,IAAKC,EAAUyC,EAAVzC,WAAYC,GAASwC,EAATxC,UAAWC,GAAGuC,EAAHvC,IAEzDtC,QAAQC,IAAI,sCAEZ,IAAIC,GAAYC,YAAYC,MAC5B1B,EAAAvG,IAAAoF,MAAC,SAAAuH,IAAA,IAAAC,EAAAC,EAAAxC,EAAA,OAAArK,IAAAuB,MAAA,SAAAuL,GAAA,cAAAA,EAAAjH,KAAAiH,EAAA5I,MAAA,OASgC,OAThC4I,EAAAjH,KAAA,EAG0B,iBAARsE,IAAoBpD,EAAe0D,QAAQN,IAGhDyC,EAAgB7F,EAAe+B,wBAAwBV,GAGzDyE,GAAgB,EAAKC,EAAAjH,KAAA,EAAAiH,EAAA5I,KAAA,EAEf6C,EAAemC,cAAc6D,WAAWH,EAAc7D,MAAK,OACjE8D,GAAgB,EAAKC,EAAA5I,KAAA,iBAAA4I,EAAAjH,KAAA,GAAAiH,EAAAnD,GAAAmD,EAAA,SAErBjF,QAAQC,IAAI,yEAEV,YAGF+E,EAAe,CAAFC,EAAA5I,KAAA,yBAAA+E,OACI2D,EAAc7D,KAAI,0CAIvC,OADAlB,QAAQC,IAAI,WAAYkC,GACxB8C,EAAA5I,KAAA,GACwB6C,EAAeiG,OACnC5E,EACA4B,EACAC,OACAjD,EACAkD,GACAtD,EAAAA,WAAgBiC,YAAYjB,IAC/B,QAPGyC,EAAWyC,EAAAlJ,KAUfiE,QAAQC,IAAI,sCAADmB,OAAuCoB,EAAW,gBAAApB,OAAejB,YAAYC,MAAQF,GAAS,QACzGb,KAAKC,YAAY,CACbtF,KAAM,+BACNoL,kBAAmB5C,IACpByC,EAAA5I,KAAA,iBAAA4I,EAAAjH,KAAA,GAAAiH,EAAAI,GAAAJ,EAAA,SAEHjF,QAAQC,IAAGgF,EAAAI,IACXhG,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAciD,EAAAI,GAAMxD,aACrB,QAEiC,OAFjCoD,EAAAjH,KAAA,GAEHkB,EAAe0D,QAAQ5D,GAAaiG,EAAA1G,OAAA,6BAAA0G,EAAA9G,OAAA,GAAA2G,EAAA,+BA/C5CpG,EAkDJ,MAAO,GAAqB,eAAjBe,EAAGC,KAAK1F,KAAuB,CACtC,IAAAsL,GAAiD7F,EAAGC,KAA5C6F,GAAWD,GAAXC,YAAaC,GAAMF,GAANE,OAAQzF,GAAUuF,GAAVvF,WAAYuC,GAAGgD,GAAHhD,IAEzCtC,QAAQC,IAAI,iCAEZ,IAAIC,GAAYC,YAAYC,MAC5B1B,EAAAvG,IAAAoF,MAAC,SAAAkI,IAAA,IAAAjD,EAAA,OAAArK,IAAAuB,MAAA,SAAAgM,GAAA,cAAAA,EAAA1H,KAAA0H,EAAArJ,MAAA,OAKO,OALPqJ,EAAA1H,KAAA,EAG0B,iBAARsE,IAAoBpD,EAAe0D,QAAQN,IAEtDoD,EAAArJ,KAAA,EAC0B6C,EAAeyG,MACrCJ,GACAC,GACAzG,EAAAA,WAAgBiC,YAAYjB,SAC5BZ,GACH,OALKqD,EAAWkD,EAAA3J,KAQjBiE,QAAQC,IAAI,iCAADmB,OAAkCoB,EAAW,gBAAApB,OAAejB,YAAYC,MAAQF,GAAS,QACpGb,KAAKC,YAAY,CACbtF,KAAM,8BACN4L,iBAAkBpD,IACnBkD,EAAArJ,KAAA,gBAAAqJ,EAAA1H,KAAA,EAAA0H,EAAA5D,GAAA4D,EAAA,SAEH1F,QAAQC,IAAGyF,EAAA5D,IACXzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAc0D,EAAA5D,GAAMD,aACrB,QAEiC,OAFjC6D,EAAA1H,KAAA,GAEHkB,EAAe0D,QAAQ5D,GAAa0G,EAAAnH,OAAA,6BAAAmH,EAAAvH,OAAA,GAAAsH,EAAA,uBA1B5C/G,EA6BJ,MAAO,GAAqB,cAAjBe,EAAGC,KAAK1F,KAAsB,CACrC,IAAA6L,GACIpG,EAAGC,KADCoG,GAASD,GAATC,UAAWC,GAASF,GAATE,UAAW5D,GAAG0D,GAAH1D,IAAKC,GAAUyD,GAAVzD,WAAYC,GAASwD,GAATxD,UAAWtC,GAAU8F,GAAV9F,WAAYuC,GAAGuD,GAAHvD,IAGtEtC,QAAQC,IAAI,gCAEZ,IAAIC,GAAYC,YAAYC,MAC5B1B,EAAAvG,IAAAoF,MAAC,SAAAyI,IAAA,IAAAxD,EAAA,OAAArK,IAAAuB,MAAA,SAAAuM,GAAA,cAAAA,EAAAjI,KAAAiI,EAAA5J,MAAA,OAMO,OANP4J,EAAAjI,KAAA,EAI0B,iBAARsE,IAAoBpD,EAAe0D,QAAQN,IAEtD2D,EAAA5J,KAAA,EAC0B6C,EAAegH,KACrCJ,GACAC,GACA5D,GACAC,QACAjD,EACAkD,GACAtD,EAAAA,WAAgBiC,YAAYjB,SAC5BZ,GACH,OATKqD,EAAWyD,EAAAlK,KAYjBiE,QAAQC,IAAI,gCAADmB,OAAiCoB,EAAW,gBAAApB,OAAejB,YAAYC,MAAQF,GAAS,QACnGb,KAAKC,YAAY,CACbtF,KAAM,6BACNmM,gBAAiB3D,IAClByD,EAAA5J,KAAA,gBAAA4J,EAAAjI,KAAA,EAAAiI,EAAAnE,GAAAmE,EAAA,SAEHjG,QAAQC,IAAGgG,EAAAnE,IACXzC,KAAKC,YAAY,CACbtF,KAAM,QACNgI,aAAciE,EAAAnE,GAAMD,aACrB,QAEiC,OAFjCoE,EAAAjI,KAAA,GAEHkB,EAAe0D,QAAQ5D,GAAaiH,EAAA1H,OAAA,6BAAA0H,EAAA9H,OAAA,GAAA6H,EAAA,uBA/B5CtH,EAkCJ,CACJ","sources":["webpack://aleo-website/./src/workers/worker.js"],"sourcesContent":["import * as aleo from \"@provablehq/sdk\";\n\nawait aleo.initThreadPool();\n\nconst defaultHost = \"https://api.explorer.aleo.org/v1\";\nconst keyProvider = new aleo.AleoKeyProvider();\nconst programManager = new aleo.ProgramManager(defaultHost, keyProvider, undefined);\nkeyProvider.useCache(true);\n\nself.postMessage({\n type: \"ALEO_WORKER_READY\",\n});\n\nlet lastLocalProgram = null;\nself.addEventListener(\"message\", (ev) => {\n if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_LOCAL\") {\n const { localProgram, aleoFunction, inputs, privateKey } = ev.data;\n\n console.log(\"Web worker: Executing function locally...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = programManager.networkClient.getProgramImports(localProgram);\n\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(localProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey});\n\n // Execute the function locally\n let response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n false,\n imports,\n keyParams,\n undefined,\n undefined,\n privateKeyObject,\n undefined\n );\n\n // Return the outputs to the main thread\n console.log(`Web worker: Local execution completed in ${performance.now() - startTime} ms`);\n const outputs = response.getOutputs();\n let execution = response.getExecution();\n if (execution) {\n aleo.verifyFunctionExecution(execution, keyProvider.getKeys(cacheKey)[1], program, \"hello\");\n execution = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n execution = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n self.postMessage({\n type: \"OFFLINE_EXECUTION_COMPLETED\",\n outputs: {outputs: outputs, execution: execution}\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_EXECUTE_PROGRAM_ON_CHAIN\") {\n const {\n remoteProgram,\n aleoFunction,\n inputs,\n privateKey,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\"Web worker: Creating execution...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey)\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n\n // Get the proving and verifying keys for the function\n const cacheKey = `${program_id}:${aleoFunction}`;\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(remoteProgram, aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Pass the cache key to the execute function\n const keyParams = new aleo.AleoKeyProviderParams({\"cacheKey\": cacheKey})\n\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n const transaction = await programManager.execute({\n programName: program_id,\n functionName: aleoFunction,\n fee: fee,\n privateFee: privateFee,\n inputs: inputs,\n keySearchParams: keyParams,\n feeRecord: feeRecord,\n privateKey: privateKeyObject\n });\n\n // Return the transaction id to the main thread\n console.log(`Web worker: On-chain execution transaction created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"EXECUTION_TRANSACTION_COMPLETED\",\n executeTransaction: transaction,\n });\n } catch (error) {\n console.error(`Error creating execution transaction: ${error}`);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_EXECUTION_FEE\") {\n const { remoteProgram, privateKey, aleoFunction, inputs, url } =\n ev.data;\n\n console.log(\"Web worker: Estimating execution fee...\");\n let startTime = performance.now();\n\n (async function () {\n try {\n const privateKeyObject = aleo.PrivateKey.from_string(privateKey);\n // Ensure the program is valid and that it contains the function specified\n const program = await programManager.networkClient.getProgramObject(remoteProgram);\n const program_id = program.id();\n if (!program.getFunctions().includes(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n const imports = await programManager.networkClient.getProgramImports(remoteProgram);\n\n // Get the proving and verifying keys for the function\n if (!programManager.keyProvider.containsKeys(cacheKey)) {\n console.log(`Web worker: Synthesizing proving & verifying keys for: '${program_id}:${aleoFunction}'`);\n const keys = await programManager.synthesizeKeys(program.toString(), aleoFunction, inputs, privateKeyObject);\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n }\n\n // Estimate the execution fee\n const [provingKey, verifyingKey] = programManager.keyProvider.getKeys(cacheKey);\n let executeFee = await aleo.ProgramManagerBase.estimateExecutionFee(\n privateKeyObject,\n remoteProgram,\n aleoFunction,\n inputs,\n url,\n imports,\n provingKey,\n verifyingKey,\n undefined\n );\n\n // Return the execution fee estimate to the main thread\n console.log(`Web worker: Execution fee estimated in ${performance.now() - startTime} ms`);\n console.log(`Execution Fee Estimation: ${executeFee} microcredits`);\n self.postMessage({\n type: \"EXECUTION_FEE_ESTIMATION_COMPLETED\",\n executionFee: Number(executeFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_ESTIMATE_DEPLOYMENT_FEE\") {\n const { program, url } = ev.data;\n\n console.log(\"Web worker: Estimating deployment fee...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n const imports = await programManager.networkClient.getProgramImports(program);\n console.log(\"Estimating deployment fee..\");\n let deploymentFee =\n await aleo.ProgramManagerBase.estimateDeploymentFee(\n program,\n imports,\n );\n\n // Return the deployment fee estimate to the main thread\n console.log(`Web worker: Deployment fee estimation completed in ${performance.now() - startTime} ms`);\n console.log(`Deployment Fee Estimation: ${deploymentFee} microcredits`);\n self.postMessage({\n type: \"DEPLOYMENT_FEE_ESTIMATION_COMPLETED\",\n deploymentFee: Number(deploymentFee) / 1000000 + 0.01,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n }\n })();\n } else if (ev.data.type === \"ALEO_TRANSFER\") {\n const {\n privateKey,\n amountCredits,\n recipient,\n transfer_type,\n amountRecord,\n fee,\n privateFee,\n feeRecord,\n url,\n } = ev.data;\n\n console.log(\n `Web worker: Creating transfer of type ${transfer_type}...`,\n );\n let startTime = performance.now();\n\n (async function () {\n try {\n // Set the host to the provided URL if provided\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the transfer transaction and submit it to the network\n const transaction = await programManager.transfer(\n amountCredits,\n recipient,\n transfer_type,\n fee,\n privateFee,\n undefined,\n amountRecord,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Transfer transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"TRANSFER_TRANSACTION_COMPLETED\",\n transferTransaction: transaction,\n });\n } catch (error) {\n console.error(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_DEPLOY\") {\n const { program, privateKey, fee, privateFee, feeRecord, url } = ev.data;\n\n console.log(\"Web worker: Creating deployment...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Check if the program is valid\n const programObject = programManager.createProgramFromSource(program);\n\n // Check if the program already exists on the network. If so, throw an error\n let programExists = false;\n try {\n await programManager.networkClient.getProgram(programObject.id());\n programExists = true;\n } catch (e) {\n console.log(\n `Program not found on the Aleo Network - proceeding with deployment...`,\n );\n }\n\n if (programExists) {\n throw `Program ${programObject.id()} already exists on the network`;\n }\n\n console.log(\"fee is: \", fee);\n // Create the deployment transaction and submit it to the network\n let transaction = await programManager.deploy(\n program,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n )\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Deployment transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"DEPLOY_TRANSACTION_COMPLETED\",\n deployTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_SPLIT\") {\n const { splitAmount, record, privateKey, url } = ev.data;\n\n console.log(\"Web worker: Creating split...\");\n\n let startTime = performance.now();\n (async function () {\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the split transaction and submit to the network\n const transaction = await programManager.split(\n splitAmount,\n record,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Split transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"SPLIT_TRANSACTION_COMPLETED\",\n splitTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n } else if (ev.data.type === \"ALEO_JOIN\") {\n const { recordOne, recordTwo, fee, privateFee, feeRecord, privateKey, url } =\n ev.data;\n\n console.log(\"Web worker: Creating join...\");\n\n let startTime = performance.now();\n (async function () {\n\n try {\n // Set the network client host if specified\n if (typeof url === \"string\") { programManager.setHost(url); }\n\n // Create the join transaction and submit it to the network\n const transaction = await programManager.join(\n recordOne,\n recordTwo,\n fee,\n privateFee,\n undefined,\n feeRecord,\n aleo.PrivateKey.from_string(privateKey),\n undefined\n );\n\n // Return the transaction id to the main thread\n console.log(`Web worker: Join transaction ${transaction} created in ${performance.now() - startTime} ms`);\n self.postMessage({\n type: \"JOIN_TRANSACTION_COMPLETED\",\n joinTransaction: transaction,\n });\n } catch (error) {\n console.log(error);\n self.postMessage({\n type: \"ERROR\",\n errorMessage: error.toString(),\n });\n } finally {\n programManager.setHost(defaultHost);\n }\n })();\n }\n});\n"],"names":["_regeneratorRuntime","e","t","r","Object","prototype","n","hasOwnProperty","o","defineProperty","value","i","Symbol","a","iterator","c","asyncIterator","u","toStringTag","define","enumerable","configurable","writable","wrap","Generator","create","Context","makeInvokeMethod","tryCatch","type","arg","call","h","l","f","s","y","GeneratorFunction","GeneratorFunctionPrototype","p","d","getPrototypeOf","v","values","g","defineIteratorMethods","forEach","_invoke","AsyncIterator","invoke","_typeof","resolve","__await","then","callInvokeWithMethodAndArg","Error","done","method","delegate","maybeInvokeDelegate","sent","_sent","dispatchException","abrupt","TypeError","resultName","next","nextLoc","pushTryEntry","tryLoc","catchLoc","finallyLoc","afterLoc","tryEntries","push","resetTryEntry","completion","reset","isNaN","length","displayName","isGeneratorFunction","constructor","name","mark","setPrototypeOf","__proto__","awrap","async","Promise","keys","reverse","pop","prev","charAt","slice","stop","rval","handle","complete","finish","delegateYield","asyncGeneratorStep","_asyncToGenerator","arguments","apply","_next","_throw","aleo","defaultHost","keyProvider","programManager","undefined","useCache","self","postMessage","lastLocalProgram","addEventListener","ev","data","_ev$data","localProgram","aleoFunction","inputs","privateKey","console","log","startTime","performance","now","_callee","privateKeyObject","program","program_id","cacheKey","imports","keyParams","response","outputs","execution","_context","from_string","createProgramFromSource","id","hasFunction","concat","networkClient","getProgramImports","synthesizeKeys","cacheKeys","run","getOutputs","getExecution","getKeys","toString","t0","error","errorMessage","_ev$data2","remoteProgram","fee","privateFee","feeRecord","url","_callee2","transaction","_context2","getProgramObject","containsKeys","setHost","execute","programName","functionName","keySearchParams","executeTransaction","_ev$data3","_callee3","_programManager$keyPr","_programManager$keyPr2","provingKey","verifyingKey","executeFee","_context3","getFunctions","includes","estimateExecutionFee","executionFee","Number","_ev$data4","_callee4","deploymentFee","_context4","estimateDeploymentFee","_ev$data5","amountCredits","recipient","transfer_type","amountRecord","_callee5","_context5","transfer","transferTransaction","_ev$data6","_callee6","programObject","programExists","_context6","getProgram","deploy","deployTransaction","t1","_ev$data7","splitAmount","record","_callee7","_context7","split","splitTransaction","_ev$data8","recordOne","recordTwo","_callee8","_context8","join","joinTransaction"],"sourceRoot":""} \ No newline at end of file diff --git a/682.bundle.js b/682.bundle.js new file mode 100644 index 000000000..a958fdc75 --- /dev/null +++ b/682.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={682:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=682.bundle.js.map \ No newline at end of file diff --git a/682.bundle.js.map b/682.bundle.js.map new file mode 100644 index 000000000..61a2b3961 --- /dev/null +++ b/682.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"682.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t682: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/820.bundle.js b/820.bundle.js deleted file mode 100644 index f5e2865c8..000000000 --- a/820.bundle.js +++ /dev/null @@ -1,3 +0,0 @@ -/*! For license information please see 820.bundle.js.LICENSE.txt */ -(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[820,511],{4494:(t,e,_)=>{t.exports=_.p+"38c18e22c4f37629c446.wasm"},3645:(t,e,_)=>{t.exports=_.p+"f62b366a9b5fa66a5bcc.js"},6511:(t,e,_)=>{_.a(t,(async(t,r)=>{try{function n(t,e,_,r){return new Promise((n=>{const i=new Worker(t,{type:"module"});i.addEventListener("message",(t=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:e,memory:_,address:r})}))}let j;_.d(e,{$r:()=>Ut,CK:()=>O,Gd:()=>jt,IO:()=>Dt,L:()=>Wt,PD:()=>Lt,Pc:()=>Nt,SF:()=>Ot,XV:()=>$t,YW:()=>qt,_U:()=>zt,_q:()=>Ct,fW:()=>Bt,gN:()=>At,hz:()=>Ht,kL:()=>Rt,o:()=>Et,uq:()=>Kt,zW:()=>It});const M=new Array(128).fill(void 0);function i(t){return M[t]}M.push(void 0,null,!0,!1);let C=M.length;function o(t){t<132||(M[t]=C,C=t)}function a(t){const e=i(t);return o(t),e}const K="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&K.decode();let U=null;function s(){return null!==U&&U.buffer===j.memory.buffer||(U=new Uint8Array(j.memory.buffer)),U}function c(t,e){return t>>>=0,K.decode(s().slice(t,t+e))}function g(t){C===M.length&&M.push(M.length+1);const e=C;return C=M[e],M[e]=t,e}let I=0;const B="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},L=function(t,e){const _=B.encode(t);return e.set(_),{read:t.length,written:_.length}};function w(t,e,_){if(void 0===_){const _=B.encode(t),r=e(_.length,1)>>>0;return s().subarray(r,r+_.length).set(_),I=_.length,r}let r=t.length,n=e(r,1)>>>0;const i=s();let o=0;for(;o127)break;i[n+o]=e}if(o!==r){0!==o&&(t=t.slice(o)),n=_(n,r,r=o+3*t.length,1)>>>0;const e=s().subarray(n+o,n+r);o+=L(t,e).written,n=_(n,r,o,1)>>>0}return I=o,n}function d(t){return null==t}let W=null;function b(){return null!==W&&W.buffer===j.memory.buffer||(W=new Int32Array(j.memory.buffer)),W}function l(t){const e=typeof t;if("number"==e||"boolean"==e||null==t)return`${t}`;if("string"==e)return`"${t}"`;if("symbol"==e){const e=t.description;return null==e?"Symbol":`Symbol(${e})`}if("function"==e){const e=t.name;return"string"==typeof e&&e.length>0?`Function(${e})`:"Function"}if(Array.isArray(t)){const e=t.length;let _="[";e>0&&(_+=l(t[0]));for(let r=1;r1))return toString.call(t);if(r=_[1],"Object"==r)try{return"Object("+JSON.stringify(t)+")"}catch(t){return"Object"}return t instanceof Error?`${t.name}: ${t.message}\n${t.stack}`:r}const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>{j.__wbindgen_export_3.get(t.dtor)(t.a,t.b)}));function u(t,e,_,r){const n={a:t,b:e,cnt:1,dtor:_},i=(...t)=>{n.cnt++;const e=n.a;n.a=0;try{return r(e,n.b,...t)}finally{0==--n.cnt?(j.__wbindgen_export_3.get(n.dtor)(e,n.b),N.unregister(n)):n.a=e}};return i.original=n,N.register(i,n,n),i}function f(t,e,_){j._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710(t,e,g(_))}function p(t,e){if(!(t instanceof e))throw new Error(`expected instance of ${e.name}`);return t.ptr}function y(t,e){const _=e(1*t.length,1)>>>0;return s().set(t,_/1),I=t.length,_}function m(t,e,_,r){try{const o=j.__wbindgen_add_to_stack_pointer(-16);p(t,J),p(e,St),p(_,gt);const s=w(r,j.__wbindgen_malloc,j.__wbindgen_realloc),c=I;j.verifyFunctionExecution(o,t.__wbg_ptr,e.__wbg_ptr,_.__wbg_ptr,s,c);var n=b()[o/4+0],i=b()[o/4+1];if(b()[o/4+2])throw a(i);return 0!==n}finally{j.__wbindgen_add_to_stack_pointer(16)}}let q=null;function h(){return null!==q&&q.buffer===j.memory.buffer||(q=new BigInt64Array(j.memory.buffer)),q}function v(t,e){return t>>>=0,s().subarray(t/1,t/1+e)}function k(t){j.runRayonThread(t)}function P(t,e){return a(j.initThreadPool(g(t),e))}function S(t,e){try{return t.apply(this,e)}catch(t){j.__wbindgen_exn_store(g(t))}}function x(t,e,_,r){j.wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a(t,e,g(_),g(r))}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_address_free(t>>>0)));let $=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,D.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_address_free(t)}static from_private_key(e){p(e,ot);const _=j.address_from_private_key(e.__wbg_ptr);return t.__wrap(_)}static from_view_key(e){p(e,Tt);const _=j.address_from_view_key(e.__wbg_ptr);return t.__wrap(_)}static from_string(e){const _=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I,n=j.address_from_string(_,r);return t.__wrap(n)}to_string(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.address_to_string(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}verify(t,e){const _=y(t,j.__wbindgen_malloc),r=I;p(e,ht);return 0!==j.address_verify(this.__wbg_ptr,_,r,e.__wbg_ptr)}};const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_execution_free(t>>>0)));let J=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,H.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_execution_free(t)}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.execution_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.execution_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}};const G="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_executionresponse_free(t>>>0)));let X=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,G.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,G.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_executionresponse_free(t)}getOutputs(){return a(j.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const t=j.executionresponse_getExecution(this.__wbg_ptr);return 0===t?void 0:J.__wrap(t)}getKeys(){try{const _=j.__wbindgen_add_to_stack_pointer(-16);j.executionresponse_getKeys(_,this.__wbg_ptr);var t=b()[_/4+0],e=b()[_/4+1];if(b()[_/4+2])throw a(e);return tt.__wrap(t)}finally{j.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const t=j.executionresponse_getProvingKey(this.__wbg_ptr);return 0===t?void 0:lt.__wrap(t)}getVerifyingKey(){const t=j.executionresponse_getVerifyingKey(this.__wbg_ptr);return St.__wrap(t)}getFunctionId(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.executionresponse_getFunctionId(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}getProgram(){const t=j.executionresponse_getProgram(this.__wbg_ptr);return gt.__wrap(t)}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_field_free(t>>>0)));let Q=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,Y.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_field_free(t)}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.field_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.field_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_keypair_free(t>>>0)));class tt{static __wrap(t){t>>>=0;const e=Object.create(tt.prototype);return e.__wbg_ptr=t,Z.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_keypair_free(t)}constructor(t,e){p(t,lt);var _=t.__destroy_into_raw();p(e,St);var r=e.__destroy_into_raw();const n=j.keypair_new(_,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const _=j.__wbindgen_add_to_stack_pointer(-16);j.keypair_provingKey(_,this.__wbg_ptr);var t=b()[_/4+0],e=b()[_/4+1];if(b()[_/4+2])throw a(e);return lt.__wrap(t)}finally{j.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const _=j.__wbindgen_add_to_stack_pointer(-16);j.keypair_verifyingKey(_,this.__wbg_ptr);var t=b()[_/4+0],e=b()[_/4+1];if(b()[_/4+2])throw a(e);return St.__wrap(t)}finally{j.__wbindgen_add_to_stack_pointer(16)}}}const et="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_metadata_free(t>>>0)));let _t=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,et.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,et.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_metadata_free(t)}get locator(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.__wbg_get_metadata_locator(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}set locator(t){const e=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;j.__wbg_set_metadata_locator(this.__wbg_ptr,e,_)}get prover(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.__wbg_get_metadata_prover(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}set prover(t){const e=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;j.__wbg_set_metadata_prover(this.__wbg_ptr,e,_)}get verifier(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}set verifier(t){const e=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;j.__wbg_set_metadata_verifier(this.__wbg_ptr,e,_)}get verifyingKey(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}set verifyingKey(t){const e=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;j.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,e,_)}static baseUrl(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.metadata_baseUrl(n);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}static bond_public(){const e=j.metadata_bond_public();return t.__wrap(e)}static bond_validator(){const e=j.metadata_bond_validator();return t.__wrap(e)}static claim_unbond_public(){const e=j.metadata_claim_unbond_public();return t.__wrap(e)}static fee_private(){const e=j.metadata_fee_private();return t.__wrap(e)}static fee_public(){const e=j.metadata_fee_public();return t.__wrap(e)}static inclusion(){const e=j.metadata_inclusion();return t.__wrap(e)}static join(){const e=j.metadata_join();return t.__wrap(e)}static set_validator_state(){const e=j.metadata_set_validator_state();return t.__wrap(e)}static split(){const e=j.metadata_split();return t.__wrap(e)}static transfer_private(){const e=j.metadata_transfer_private();return t.__wrap(e)}static transfer_private_to_public(){const e=j.metadata_transfer_private_to_public();return t.__wrap(e)}static transfer_public(){const e=j.metadata_transfer_public();return t.__wrap(e)}static transfer_public_as_signer(){const e=j.metadata_transfer_public_as_signer();return t.__wrap(e)}static transfer_public_to_private(){const e=j.metadata_transfer_public_to_private();return t.__wrap(e)}static unbond_public(){const e=j.metadata_unbond_public();return t.__wrap(e)}};const rt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_offlinequery_free(t>>>0)));let nt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,rt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,rt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_offlinequery_free(t)}constructor(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.offlinequery_new(r,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return this.__wbg_ptr=e>>>0,this}finally{j.__wbindgen_add_to_stack_pointer(16)}}addStatePath(t,e){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I,o=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),s=I;j.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,o,s);var _=b()[r/4+0];if(b()[r/4+1])throw a(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.offlinequery_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.offlinequery_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}};const it="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_privatekey_free(t>>>0)));let ot=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,it.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,it.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_privatekey_free(t)}constructor(){const t=j.privatekey_new();return this.__wbg_ptr=t>>>0,this}static from_seed_unchecked(e){const _=y(e,j.__wbindgen_malloc),r=I,n=j.privatekey_from_seed_unchecked(_,r);return t.__wrap(n)}static from_string(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.privatekey_from_string(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}to_string(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.privatekey_to_string(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}to_view_key(){const t=j.privatekey_to_view_key(this.__wbg_ptr);return Tt.__wrap(t)}to_address(){const t=j.privatekey_to_address(this.__wbg_ptr);return $.__wrap(t)}sign(t){const e=y(t,j.__wbindgen_malloc),_=I,r=j.privatekey_sign(this.__wbg_ptr,e,_);return ht.__wrap(r)}static newEncrypted(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.privatekey_newEncrypted(r,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return st.__wrap(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return st.__wrap(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(e,_){try{const i=j.__wbindgen_add_to_stack_pointer(-16);p(e,st);const o=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),s=I;j.privatekey_fromPrivateKeyCiphertext(i,e.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return t.__wrap(r)}finally{j.__wbindgen_add_to_stack_pointer(16)}}};const at="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_privatekeyciphertext_free(t>>>0)));let st=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,at.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,at.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_privatekeyciphertext_free(t)}static encryptPrivateKey(e,_){try{const i=j.__wbindgen_add_to_stack_pointer(-16);p(e,ot);const o=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),s=I;j.privatekey_toCiphertext(i,e.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return t.__wrap(r)}finally{j.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return ot.__wrap(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.privatekeyciphertext_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.privatekeyciphertext_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}};const ct="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_program_free(t>>>0)));let gt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,ct.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,ct.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_program_free(t)}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.program_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.program_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}hasFunction(t){const e=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;return 0!==j.program_hasFunction(this.__wbg_ptr,e,_)}getFunctions(){return a(j.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return a(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const _=j.__wbindgen_add_to_stack_pointer(-16);j.program_getMappings(_,this.__wbg_ptr);var t=b()[_/4+0],e=b()[_/4+1];if(b()[_/4+2])throw a(e);return a(t)}finally{j.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.program_getRecordMembers(r,this.__wbg_ptr,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return a(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.program_getStructMembers(r,this.__wbg_ptr,n,i);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return a(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const e=j.program_getCreditsProgram();return t.__wrap(e)}id(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.program_id(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}address(){try{const _=j.__wbindgen_add_to_stack_pointer(-16);j.program_address(_,this.__wbg_ptr);var t=b()[_/4+0],e=b()[_/4+1];if(b()[_/4+2])throw a(e);return $.__wrap(t)}finally{j.__wbindgen_add_to_stack_pointer(16)}}isEqual(e){p(e,t);return 0!==j.program_isEqual(this.__wbg_ptr,e.__wbg_ptr)}getImports(){return a(j.program_getImports(this.__wbg_ptr))}};const wt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_programmanager_free(t>>>0)));let dt=class{__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,wt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_programmanager_free(t)}static buildDeploymentTransaction(t,e,_,r,n,i,o,s,c){p(t,ot);const b=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),l=I;let u=0;d(r)||(p(r,yt),u=r.__destroy_into_raw());var f=d(n)?0:w(n,j.__wbindgen_malloc,j.__wbindgen_realloc),y=I;let m=0;d(o)||(p(o,lt),m=o.__destroy_into_raw());let h=0;d(s)||(p(s,St),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,nt),v=c.__destroy_into_raw());return a(j.programmanager_buildDeploymentTransaction(t.__wbg_ptr,b,l,_,u,f,y,d(i)?0:g(i),m,h,v))}static estimateDeploymentFee(t,e){const _=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I;return a(j.programmanager_estimateDeploymentFee(_,r,d(e)?0:g(e)))}static estimateProgramNameCost(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16),n=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),i=I;j.programmanager_estimateProgramNameCost(r,n,i);var e=h()[r/8+0],_=b()[r/4+2];if(b()[r/4+3])throw a(_);return BigInt.asUintN(64,e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(t,e,_,r,n,i,o,s,c,b,l){p(t,ot);const u=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),f=I,y=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),m=I;let h=0;d(s)||(p(s,lt),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,St),v=c.__destroy_into_raw());var k=d(b)?0:w(b,j.__wbindgen_malloc,j.__wbindgen_realloc),P=I;let S=0;d(l)||(p(l,nt),S=l.__destroy_into_raw());return a(j.programmanager_executeFunctionOffline(t.__wbg_ptr,u,f,y,m,g(r),n,i,d(o)?0:g(o),h,v,k,P,S))}static buildExecutionTransaction(t,e,_,r,n,i,o,s,c,b,l,u,f){p(t,ot);const y=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),m=I,h=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),v=I;let k=0;d(i)||(p(i,yt),k=i.__destroy_into_raw());var P=d(o)?0:w(o,j.__wbindgen_malloc,j.__wbindgen_realloc),S=I;let x=0;d(c)||(p(c,lt),x=c.__destroy_into_raw());let T=0;d(b)||(p(b,St),T=b.__destroy_into_raw());let V=0;d(l)||(p(l,lt),V=l.__destroy_into_raw());let F=0;d(u)||(p(u,St),F=u.__destroy_into_raw());let R=0;d(f)||(p(f,nt),R=f.__destroy_into_raw());return a(j.programmanager_buildExecutionTransaction(t.__wbg_ptr,y,m,h,v,g(r),n,k,P,S,d(s)?0:g(s),x,T,V,F,R))}static estimateExecutionFee(t,e,_,r,n,i,o,s,c){p(t,ot);const b=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),l=I,u=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),f=I;var y=d(n)?0:w(n,j.__wbindgen_malloc,j.__wbindgen_realloc),m=I;let h=0;d(o)||(p(o,lt),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,St),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,nt),k=c.__destroy_into_raw());return a(j.programmanager_estimateExecutionFee(t.__wbg_ptr,b,l,u,f,g(r),y,m,d(i)?0:g(i),h,v,k))}static estimateFinalizeFee(t,e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I,s=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),c=I;j.programmanager_estimateFinalizeFee(n,i,o,s,c);var _=h()[n/8+0],r=b()[n/4+2];if(b()[n/4+3])throw a(r);return BigInt.asUintN(64,_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(t,e,_,r,n,i,o,s,c,g,b){p(t,ot),p(e,yt);var l=e.__destroy_into_raw();p(_,yt);var u=_.__destroy_into_raw();let f=0;d(n)||(p(n,yt),f=n.__destroy_into_raw());var y=d(i)?0:w(i,j.__wbindgen_malloc,j.__wbindgen_realloc),m=I;let h=0;d(o)||(p(o,lt),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,St),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,lt),k=c.__destroy_into_raw());let P=0;d(g)||(p(g,St),P=g.__destroy_into_raw());let S=0;d(b)||(p(b,nt),S=b.__destroy_into_raw());return a(j.programmanager_buildJoinTransaction(t.__wbg_ptr,l,u,r,f,y,m,h,v,k,P,S))}static buildSplitTransaction(t,e,_,r,n,i,o){p(t,ot),p(_,yt);var s=_.__destroy_into_raw(),c=d(r)?0:w(r,j.__wbindgen_malloc,j.__wbindgen_realloc),g=I;let b=0;d(n)||(p(n,lt),b=n.__destroy_into_raw());let l=0;d(i)||(p(i,St),l=i.__destroy_into_raw());let u=0;d(o)||(p(o,nt),u=o.__destroy_into_raw());return a(j.programmanager_buildSplitTransaction(t.__wbg_ptr,e,s,c,g,b,l,u))}static buildTransferTransaction(t,e,_,r,n,i,o,s,c,g,b,l,u,f){p(t,ot);const y=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),m=I,h=w(r,j.__wbindgen_malloc,j.__wbindgen_realloc),v=I;var k=d(n)?0:w(n,j.__wbindgen_malloc,j.__wbindgen_realloc),P=I;let S=0;d(i)||(p(i,yt),S=i.__destroy_into_raw());let x=0;d(s)||(p(s,yt),x=s.__destroy_into_raw());var T=d(c)?0:w(c,j.__wbindgen_malloc,j.__wbindgen_realloc),V=I;let F=0;d(g)||(p(g,lt),F=g.__destroy_into_raw());let R=0;d(b)||(p(b,St),R=b.__destroy_into_raw());let E=0;d(l)||(p(l,lt),E=l.__destroy_into_raw());let z=0;d(u)||(p(u,St),z=u.__destroy_into_raw());let A=0;d(f)||(p(f,nt),A=f.__destroy_into_raw());return a(j.programmanager_buildTransferTransaction(t.__wbg_ptr,e,y,m,h,v,k,P,S,o,x,T,V,F,R,E,z,A))}static synthesizeKeyPair(t,e,_,r,n){p(t,ot);const i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I,s=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),c=I;return a(j.programmanager_synthesizeKeyPair(t.__wbg_ptr,i,o,s,c,g(r),d(n)?0:g(n)))}};const bt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_provingkey_free(t>>>0)));let lt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,bt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,bt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_provingkey_free(t)}isBondPublicProver(){return 0!==j.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==j.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==j.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==j.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==j.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==j.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==j.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==j.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==j.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==j.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==j.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==j.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==j.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==j.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==j.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.provingkey_checksum(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}copy(){const e=j.provingkey_copy(this.__wbg_ptr);return t.__wrap(e)}static fromBytes(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=y(e,j.__wbindgen_malloc),o=I;j.provingkey_fromBytes(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.provingkey_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.provingkey_toBytes(n,this.__wbg_ptr);var t=b()[n/4+0],e=b()[n/4+1],_=b()[n/4+2];if(b()[n/4+3])throw a(_);var r=v(t,e).slice();return j.__wbindgen_free(t,1*e,1),r}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.provingkey_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}};const ut="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_recordciphertext_free(t>>>0)));let ft=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,ut.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,ut.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_recordciphertext_free(t)}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.recordciphertext_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.recordciphertext_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}decrypt(t){try{const r=j.__wbindgen_add_to_stack_pointer(-16);p(t,Tt),j.recordciphertext_decrypt(r,this.__wbg_ptr,t.__wbg_ptr);var e=b()[r/4+0],_=b()[r/4+1];if(b()[r/4+2])throw a(_);return yt.__wrap(e)}finally{j.__wbindgen_add_to_stack_pointer(16)}}isOwner(t){p(t,Tt);return 0!==j.recordciphertext_isOwner(this.__wbg_ptr,t.__wbg_ptr)}};const pt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_recordplaintext_free(t>>>0)));let yt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,pt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,pt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_recordplaintext_free(t)}commitment(t,e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I,s=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),c=I;j.recordplaintext_commitment(n,this.__wbg_ptr,i,o,s,c);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return Q.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.recordplaintext_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.recordplaintext_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}microcredits(){const t=j.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,t)}nonce(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.recordplaintext_nonce(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}serialNumberString(t,e,_){let r,n;try{const u=j.__wbindgen_add_to_stack_pointer(-16);p(t,ot);const f=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),y=I,m=w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),h=I;j.recordplaintext_serialNumberString(u,this.__wbg_ptr,t.__wbg_ptr,f,y,m,h);var i=b()[u/4+0],o=b()[u/4+1],s=b()[u/4+2],g=b()[u/4+3],d=i,l=o;if(g)throw d=0,l=0,a(s);return r=d,n=l,c(d,l)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(r,n,1)}}};const mt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_signature_free(t>>>0)));let ht=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,mt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,mt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_signature_free(t)}static sign(e,_){p(e,ot);const r=y(_,j.__wbindgen_malloc),n=I,i=j.privatekey_sign(e.__wbg_ptr,r,n);return t.__wrap(i)}verify(t,e){p(t,$);const _=y(e,j.__wbindgen_malloc),r=I;return 0!==j.signature_verify(this.__wbg_ptr,t.__wbg_ptr,_,r)}static from_string(e){const _=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I,n=j.signature_from_string(_,r);return t.__wrap(n)}to_string(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.signature_to_string(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}};const vt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_transaction_free(t>>>0)));let kt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,vt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,vt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_transaction_free(t)}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.transaction_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.transaction_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}transactionId(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.transaction_transactionId(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}transactionType(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.transaction_transactionType(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}};const Pt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_verifyingkey_free(t>>>0)));let St=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,Pt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,Pt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_verifyingkey_free(t)}static bondPublicVerifier(){const e=j.verifyingkey_bondPublicVerifier();return t.__wrap(e)}static bondValidatorVerifier(){const e=j.verifyingkey_bondValidatorVerifier();return t.__wrap(e)}static claimUnbondPublicVerifier(){const e=j.verifyingkey_claimUnbondPublicVerifier();return t.__wrap(e)}static feePrivateVerifier(){const e=j.verifyingkey_feePrivateVerifier();return t.__wrap(e)}static feePublicVerifier(){const e=j.verifyingkey_feePublicVerifier();return t.__wrap(e)}static inclusionVerifier(){const e=j.verifyingkey_inclusionVerifier();return t.__wrap(e)}static joinVerifier(){const e=j.verifyingkey_joinVerifier();return t.__wrap(e)}static setValidatorStateVerifier(){const e=j.verifyingkey_setValidatorStateVerifier();return t.__wrap(e)}static splitVerifier(){const e=j.verifyingkey_splitVerifier();return t.__wrap(e)}static transferPrivateVerifier(){const e=j.verifyingkey_transferPrivateVerifier();return t.__wrap(e)}static transferPrivateToPublicVerifier(){const e=j.verifyingkey_transferPrivateToPublicVerifier();return t.__wrap(e)}static transferPublicVerifier(){const e=j.verifyingkey_transferPublicVerifier();return t.__wrap(e)}static transferPublicAsSignerVerifier(){const e=j.verifyingkey_transferPublicAsSignerVerifier();return t.__wrap(e)}static transferPublicToPrivateVerifier(){const e=j.verifyingkey_transferPublicToPrivateVerifier();return t.__wrap(e)}static unbondPublicVerifier(){const e=j.verifyingkey_unbondPublicVerifier();return t.__wrap(e)}isBondPublicVerifier(){return 0!==j.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==j.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==j.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==j.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==j.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==j.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==j.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==j.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==j.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==j.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==j.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==j.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==j.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==j.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==j.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.verifyingkey_checksum(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}copy(){const e=j.verifyingkey_copy(this.__wbg_ptr);return t.__wrap(e)}static fromBytes(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=y(e,j.__wbindgen_malloc),o=I;j.verifyingkey_fromBytes(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}static fromString(e){try{const n=j.__wbindgen_add_to_stack_pointer(-16),i=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;j.verifyingkey_fromString(n,i,o);var _=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return t.__wrap(_)}finally{j.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.verifyingkey_toBytes(n,this.__wbg_ptr);var t=b()[n/4+0],e=b()[n/4+1],_=b()[n/4+2];if(b()[n/4+3])throw a(_);var r=v(t,e).slice();return j.__wbindgen_free(t,1*e,1),r}finally{j.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.verifyingkey_toString(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}};const xt="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>j.__wbg_viewkey_free(t>>>0)));let Tt=class t{static __wrap(e){e>>>=0;const _=Object.create(t.prototype);return _.__wbg_ptr=e,xt.register(_,_.__wbg_ptr,_),_}__destroy_into_raw(){const t=this.__wbg_ptr;return this.__wbg_ptr=0,xt.unregister(this),t}free(){const t=this.__destroy_into_raw();j.__wbg_viewkey_free(t)}static from_private_key(e){p(e,ot);const _=j.privatekey_to_view_key(e.__wbg_ptr);return t.__wrap(_)}static from_string(e){const _=w(e,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I,n=j.viewkey_from_string(_,r);return t.__wrap(n)}to_string(){let t,e;try{const n=j.__wbindgen_add_to_stack_pointer(-16);j.viewkey_to_string(n,this.__wbg_ptr);var _=b()[n/4+0],r=b()[n/4+1];return t=_,e=r,c(_,r)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(t,e,1)}}to_address(){const t=j.address_from_view_key(this.__wbg_ptr);return $.__wrap(t)}decrypt(t){let e,_;try{const d=j.__wbindgen_add_to_stack_pointer(-16),l=w(t,j.__wbindgen_malloc,j.__wbindgen_realloc),u=I;j.viewkey_decrypt(d,this.__wbg_ptr,l,u);var r=b()[d/4+0],n=b()[d/4+1],i=b()[d/4+2],o=b()[d/4+3],s=r,g=n;if(o)throw s=0,g=0,a(i);return e=s,_=g,c(s,g)}finally{j.__wbindgen_add_to_stack_pointer(16),j.__wbindgen_free(e,_,1)}}};async function T(t,e){if("function"==typeof Response&&t instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(t,e)}catch(e){if("application/wasm"==t.headers.get("Content-Type"))throw e;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",e)}const _=await t.arrayBuffer();return await WebAssembly.instantiate(_,e)}{const _=await WebAssembly.instantiate(t,e);return _ instanceof WebAssembly.Instance?{instance:_,module:t}:_}}function V(){const t={wbg:{}};return t.wbg.__wbindgen_object_drop_ref=function(t){a(t)},t.wbg.__wbg_new_71801a555ad9f2aa=function(){return S((function(){return g(new XMLHttpRequest)}),arguments)},t.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return S((function(t,e,_){i(t).overrideMimeType(c(e,_))}),arguments)},t.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return S((function(t,e,_,r,n,o){i(t).open(c(e,_),c(r,n),0!==o)}),arguments)},t.wbg.__wbg_send_80d29985093c1ec5=function(){return S((function(t){i(t).send()}),arguments)},t.wbg.__wbg_response_7c2e2759084f7279=function(){return S((function(t){return g(i(t).response)}),arguments)},t.wbg.__wbg_status_d485fb5a478426fb=function(){return S((function(t){return i(t).status}),arguments)},t.wbg.__wbg_new_72fb9a18b5ae2624=function(){return g(new Object)},t.wbg.__wbindgen_string_new=function(t,e){return g(c(t,e))},t.wbg.__wbg_set_1f9b04f170055d33=function(){return S((function(t,e,_){return Reflect.set(i(t),i(e),i(_))}),arguments)},t.wbg.__wbg_new_ab6fd82b10560829=function(){return S((function(){return g(new Headers)}),arguments)},t.wbg.__wbindgen_object_clone_ref=function(t){return g(i(t))},t.wbg.__wbg_new_0d76b0581eca6298=function(){return S((function(){return g(new AbortController)}),arguments)},t.wbg.__wbg_signal_a61f78a3478fd9bc=function(t){return g(i(t).signal)},t.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return S((function(t,e,_,r,n){i(t).append(c(e,_),c(r,n))}),arguments)},t.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(t){let e;try{e=i(t)instanceof Response}catch(t){e=!1}return e},t.wbg.__wbg_status_61a01141acd3cf74=function(t){return i(t).status},t.wbg.__wbg_url_5f6dc4009ac5f99d=function(t,e){const _=w(i(e).url,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I;b()[t/4+1]=r,b()[t/4+0]=_},t.wbg.__wbg_headers_9620bfada380764a=function(t){return g(i(t).headers)},t.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return g(Symbol.iterator)},t.wbg.__wbg_get_e3c254076557e348=function(){return S((function(t,e){return g(Reflect.get(i(t),i(e)))}),arguments)},t.wbg.__wbindgen_is_function=function(t){return"function"==typeof i(t)},t.wbg.__wbg_call_27c0f87801dedf93=function(){return S((function(t,e){return g(i(t).call(i(e)))}),arguments)},t.wbg.__wbindgen_is_object=function(t){const e=i(t);return"object"==typeof e&&null!==e},t.wbg.__wbg_next_40fc327bfc8770e6=function(t){return g(i(t).next)},t.wbg.__wbg_next_196c84450b364254=function(){return S((function(t){return g(i(t).next())}),arguments)},t.wbg.__wbg_done_298b57d23c0fc80c=function(t){return i(t).done},t.wbg.__wbg_value_d93c65011f51a456=function(t){return g(i(t).value)},t.wbg.__wbg_abort_2aa7521d5690750e=function(t){i(t).abort()},t.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return S((function(t){return g(JSON.stringify(i(t)))}),arguments)},t.wbg.__wbindgen_string_get=function(t,e){const _=i(e),r="string"==typeof _?_:void 0;var n=d(r)?0:w(r,j.__wbindgen_malloc,j.__wbindgen_realloc),o=I;b()[t/4+1]=o,b()[t/4+0]=n},t.wbg.__wbg_log_0159ca40cddf5b15=function(t,e){console.log(c(t,e))},t.wbg.__wbindgen_bigint_from_u64=function(t){return g(BigInt.asUintN(64,t))},t.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return S((function(t,e,_){return g(i(t).call(i(e),i(_)))}),arguments)},t.wbg.__wbg_keypair_new=function(t){return g(tt.__wrap(t))},t.wbg.__wbindgen_module=function(){return g(z.__wbindgen_wasm_module)},t.wbg.__wbindgen_memory=function(){return g(j.memory)},t.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(t,e,_,r){return g(n(i(t),i(e),i(_),r>>>0))},t.wbg.__wbg_executionresponse_new=function(t){return g(X.__wrap(t))},t.wbg.__wbg_transaction_new=function(t){return g(kt.__wrap(t))},t.wbg.__wbg_newwithlength_66ae46612e7f0234=function(t){return g(new Array(t>>>0))},t.wbg.__wbg_set_d4638f722068f043=function(t,e,_){i(t)[e>>>0]=a(_)},t.wbg.__wbindgen_cb_drop=function(t){const e=a(t).original;if(1==e.cnt--)return e.a=0,!0;return!1},t.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return g(new Array)},t.wbg.__wbg_push_a5b05aedc7234f9f=function(t,e){return i(t).push(i(e))},t.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return S((function(t){return g(i(t).arrayBuffer())}),arguments)},t.wbg.__wbg_new_63b92bc8671ed464=function(t){return g(new Uint8Array(i(t)))},t.wbg.__wbg_length_c20a40f15020d68a=function(t){return i(t).length},t.wbg.__wbg_new_81740750da40724f=function(t,e){try{var _={a:t,b:e};const r=new Promise(((t,e)=>{const r=_.a;_.a=0;try{return x(r,_.b,t,e)}finally{_.a=r}}));return g(r)}finally{_.a=_.b=0}},t.wbg.__wbindgen_number_new=function(t){return g(t)},t.wbg.__wbg_new_abda76e883ba8a5f=function(){return g(new Error)},t.wbg.__wbg_stack_658279fe44541cf6=function(t,e){const _=w(i(e).stack,j.__wbindgen_malloc,j.__wbindgen_realloc),r=I;b()[t/4+1]=r,b()[t/4+0]=_},t.wbg.__wbg_error_f851667af71bcfc6=function(t,e){let _,r;try{_=t,r=e,console.error(c(t,e))}finally{j.__wbindgen_free(_,r,1)}},t.wbg.__wbg_buffer_12d079cc21e14bdb=function(t){return g(i(t).buffer)},t.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(t,e,_){return g(new Uint8Array(i(t),e>>>0,_>>>0))},t.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return S((function(t,e){i(t).randomFillSync(a(e))}),arguments)},t.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(t,e,_){return g(i(t).subarray(e>>>0,_>>>0))},t.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return S((function(t,e){i(t).getRandomValues(i(e))}),arguments)},t.wbg.__wbg_set_a47bac70306a19a7=function(t,e,_){i(t).set(i(e),_>>>0)},t.wbg.__wbg_crypto_1d1f22824a6a080c=function(t){return g(i(t).crypto)},t.wbg.__wbg_process_4a72847cc503995b=function(t){return g(i(t).process)},t.wbg.__wbg_versions_f686565e586dd935=function(t){return g(i(t).versions)},t.wbg.__wbg_node_104a2ff8d6ea03a2=function(t){return g(i(t).node)},t.wbg.__wbindgen_is_string=function(t){return"string"==typeof i(t)},t.wbg.__wbg_require_cca90b1a94a0255b=function(){return S((function(){return g(module.require)}),arguments)},t.wbg.__wbg_msCrypto_eb05e62b530a1508=function(t){return g(i(t).msCrypto)},t.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(t){return g(new Uint8Array(t>>>0))},t.wbg.__wbg_length_cd7af8117672b8b8=function(t){return i(t).length},t.wbg.__wbg_get_bd8e338fbd5f5cc8=function(t,e){return g(i(t)[e>>>0])},t.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return S((function(){return g(self.self)}),arguments)},t.wbg.__wbg_window_c6fb939a7f436783=function(){return S((function(){return g(window.window)}),arguments)},t.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return S((function(){return g(globalThis.globalThis)}),arguments)},t.wbg.__wbg_global_207b558942527489=function(){return S((function(){return g(global.global)}),arguments)},t.wbg.__wbindgen_is_undefined=function(t){return void 0===i(t)},t.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(t,e){return g(new Function(c(t,e)))},t.wbg.__wbg_has_0af94d20077affa2=function(){return S((function(t,e){return Reflect.has(i(t),i(e))}),arguments)},t.wbg.__wbg_fetch_bc7c8e27076a5c84=function(t){return g(fetch(i(t)))},t.wbg.__wbg_fetch_921fad6ef9e883dd=function(t,e){return g(i(t).fetch(i(e)))},t.wbg.__wbindgen_debug_string=function(t,e){const _=w(l(i(e)),j.__wbindgen_malloc,j.__wbindgen_realloc),r=I;b()[t/4+1]=r,b()[t/4+0]=_},t.wbg.__wbindgen_throw=function(t,e){throw new Error(c(t,e))},t.wbg.__wbindgen_rethrow=function(t){throw a(t)},t.wbg.__wbg_then_a73caa9a87991566=function(t,e,_){return g(i(t).then(i(e),i(_)))},t.wbg.__wbg_then_0c86a60e8fcfe9f6=function(t,e){return g(i(t).then(i(e)))},t.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(t){queueMicrotask(i(t))},t.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(t){return g(i(t).queueMicrotask)},t.wbg.__wbg_resolve_b0083a7967828ec8=function(t){return g(Promise.resolve(i(t)))},t.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return g(Atomics.waitAsync)},t.wbg.__wbg_new_8cccba86b0f574cb=function(t){return g(new Int32Array(i(t)))},t.wbg.__wbg_waitAsync_46d5c36955b71a79=function(t,e,_){return g(Atomics.waitAsync(i(t),e,_))},t.wbg.__wbg_async_19c0400d97cc72fe=function(t){return i(t).async},t.wbg.__wbg_value_571d60108110e917=function(t){return g(i(t).value)},t.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(t){const e=w("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),j.__wbindgen_malloc,j.__wbindgen_realloc),_=I;b()[t/4+1]=_,b()[t/4+0]=e},t.wbg.__wbg_new_d1187ae36d662ef9=function(){return S((function(t,e){return g(new Worker(c(t,e)))}),arguments)},t.wbg.__wbg_setonmessage_503809e5bb51bd33=function(t,e){i(t).onmessage=i(e)},t.wbg.__wbg_of_6a70eed8d41f469c=function(t,e,_){return g(Array.of(i(t),i(e),i(_)))},t.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return S((function(t,e){i(t).postMessage(i(e))}),arguments)},t.wbg.__wbg_data_3ce7c145ca4fbcdc=function(t){return g(i(t).data)},t.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return S((function(t,e,_){return g(new Request(c(t,e),i(_)))}),arguments)},t.wbg.__wbg_responseText_c67ed2d48db10769=function(){return S((function(t,e){const _=i(e).responseText;var r=d(_)?0:w(_,j.__wbindgen_malloc,j.__wbindgen_realloc),n=I;b()[t/4+1]=n,b()[t/4+0]=r}),arguments)},t.wbg.__wbindgen_closure_wrapper5763=function(t,e,_){return g(u(t,e,538,f))},t.wbg.__wbindgen_closure_wrapper5788=function(t,e,_){return g(u(t,e,538,f))},t}function F(t,e){t.wbg.memory=e||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(t,e){return j=t.exports,z.__wbindgen_wasm_module=e,q=null,W=null,U=null,j.__wbindgen_start(),j}function E(t,e){if(void 0!==j)return j;const _=V();F(_,e),t instanceof WebAssembly.Module||(t=new WebAssembly.Module(t));return R(new WebAssembly.Instance(t,_),t)}async function z(t,e){if(void 0!==j)return j;const _=V();("string"==typeof t||"function"==typeof Request&&t instanceof Request||"function"==typeof URL&&t instanceof URL)&&(t=fetch(t)),F(_,e);const{instance:r,module:n}=await T(await t,_);return R(r,n)}var A=Object.freeze({__proto__:null,Address:$,Execution:J,ExecutionResponse:X,Field:Q,KeyPair:tt,Metadata:_t,OfflineQuery:nt,PrivateKey:ot,PrivateKeyCiphertext:st,Program:gt,ProgramManager:dt,ProvingKey:lt,RecordCiphertext:ft,RecordPlaintext:yt,Signature:ht,Transaction:kt,VerifyingKey:St,ViewKey:Tt,default:z,initSync:E,initThreadPool:P,runRayonThread:k,verifyFunctionExecution:m});const Vt="assets/aleo_wasm.wasm";const{initThreadPool:Ft,Address:Rt,Execution:Et,ExecutionResponse:zt,Field:At,Metadata:Ot,OfflineQuery:jt,Private:Mt,PrivateKey:Ct,PrivateKeyCiphertext:Kt,Program:Ut,ProvingKey:It,RecordCiphertext:Bt,RecordPlaintext:Lt,ProgramManager:Wt,Signature:Nt,Transaction:qt,ViewKey:Dt,VerifyingKey:$t,verifyFunctionExecution:Ht}=await(async(t={})=>{let{importHook:e,serverPath:_,initializeHook:r}=t,n=Vt;return null!=_&&(n=_+/[^\/\\]*$/.exec(n)[0]),null!=e&&(n=e(n)),null!=r?await r(z,n):await z(n),A})({importHook:()=>new URL(_(4494),_.b)});async function O(t){null==t&&(t=navigator.hardwareConcurrency),console.info(`Spawning ${t} threads`),await Ft(new URL(_(3645),_.b),t)}r()}catch(Jt){r(Jt)}}),1)},6891:(t,e,_)=>{_.d(e,{Ud:()=>d});const r=Symbol("Comlink.proxy"),n=Symbol("Comlink.endpoint"),i=Symbol("Comlink.releaseProxy"),o=Symbol("Comlink.finalizer"),a=Symbol("Comlink.thrown"),s=t=>"object"==typeof t&&null!==t||"function"==typeof t,c=new Map([["proxy",{canHandle:t=>s(t)&&t[r],serialize(t){const{port1:e,port2:_}=new MessageChannel;return g(t,e),[_,[_]]},deserialize:t=>(t.start(),d(t))}],["throw",{canHandle:t=>s(t)&&a in t,serialize({value:t}){let e;return e=t instanceof Error?{isError:!0,value:{message:t.message,name:t.name,stack:t.stack}}:{isError:!1,value:t},[e,[]]},deserialize(t){if(t.isError)throw Object.assign(new Error(t.value.message),t.value);throw t.value}}]]);function g(t,e=globalThis,_=["*"]){e.addEventListener("message",(function n(i){if(!i||!i.data)return;if(!function(t,e){for(const _ of t){if(e===_||"*"===_)return!0;if(_ instanceof RegExp&&_.test(e))return!0}return!1}(_,i.origin))return void console.warn(`Invalid origin '${i.origin}' for comlink proxy`);const{id:s,type:c,path:d}=Object.assign({path:[]},i.data),b=(i.data.argumentList||[]).map(v);let l;try{const e=d.slice(0,-1).reduce(((t,e)=>t[e]),t),_=d.reduce(((t,e)=>t[e]),t);switch(c){case"GET":l=_;break;case"SET":e[d.slice(-1)[0]]=v(i.data.value),l=!0;break;case"APPLY":l=_.apply(e,b);break;case"CONSTRUCT":l=function(t){return Object.assign(t,{[r]:!0})}(new _(...b));break;case"ENDPOINT":{const{port1:e,port2:_}=new MessageChannel;g(t,_),l=function(t,e){return m.set(t,e),t}(e,[e])}break;case"RELEASE":l=void 0;break;default:return}}catch(t){l={value:t,[a]:0}}Promise.resolve(l).catch((t=>({value:t,[a]:0}))).then((_=>{const[r,i]=h(_);e.postMessage(Object.assign(Object.assign({},r),{id:s}),i),"RELEASE"===c&&(e.removeEventListener("message",n),w(e),o in t&&"function"==typeof t[o]&&t[o]())})).catch((t=>{const[_,r]=h({value:new TypeError("Unserializable return value"),[a]:0});e.postMessage(Object.assign(Object.assign({},_),{id:s}),r)}))})),e.start&&e.start()}function w(t){(function(t){return"MessagePort"===t.constructor.name})(t)&&t.close()}function d(t,e){return p(t,[],e)}function b(t){if(t)throw new Error("Proxy has been released and is not useable")}function l(t){return k(t,{type:"RELEASE"}).then((()=>{w(t)}))}const u=new WeakMap,f="FinalizationRegistry"in globalThis&&new FinalizationRegistry((t=>{const e=(u.get(t)||0)-1;u.set(t,e),0===e&&l(t)}));function p(t,e=[],_=function(){}){let r=!1;const o=new Proxy(_,{get(_,n){if(b(r),n===i)return()=>{!function(t){f&&f.unregister(t)}(o),l(t),r=!0};if("then"===n){if(0===e.length)return{then:()=>o};const _=k(t,{type:"GET",path:e.map((t=>t.toString()))}).then(v);return _.then.bind(_)}return p(t,[...e,n])},set(_,n,i){b(r);const[o,a]=h(i);return k(t,{type:"SET",path:[...e,n].map((t=>t.toString())),value:o},a).then(v)},apply(_,i,o){b(r);const a=e[e.length-1];if(a===n)return k(t,{type:"ENDPOINT"}).then(v);if("bind"===a)return p(t,e.slice(0,-1));const[s,c]=y(o);return k(t,{type:"APPLY",path:e.map((t=>t.toString())),argumentList:s},c).then(v)},construct(_,n){b(r);const[i,o]=y(n);return k(t,{type:"CONSTRUCT",path:e.map((t=>t.toString())),argumentList:i},o).then(v)}});return function(t,e){const _=(u.get(e)||0)+1;u.set(e,_),f&&f.register(t,e,t)}(o,t),o}function y(t){const e=t.map(h);return[e.map((t=>t[0])),(_=e.map((t=>t[1])),Array.prototype.concat.apply([],_))];var _}const m=new WeakMap;function h(t){for(const[e,_]of c)if(_.canHandle(t)){const[r,n]=_.serialize(t);return[{type:"HANDLER",name:e,value:r},n]}return[{type:"RAW",value:t},m.get(t)||[]]}function v(t){switch(t.type){case"HANDLER":return c.get(t.name).deserialize(t.value);case"RAW":return t.value}}function k(t,e,_){return new Promise((r=>{const n=new Array(4).fill(0).map((()=>Math.floor(Math.random()*Number.MAX_SAFE_INTEGER).toString(16))).join("-");t.addEventListener("message",(function e(_){_.data&&_.data.id&&_.data.id===n&&(t.removeEventListener("message",e),r(_.data))})),t.start&&t.start(),t.postMessage(Object.assign({id:n},e),_)}))}}}]); -//# sourceMappingURL=820.bundle.js.map \ No newline at end of file diff --git a/820.bundle.js.map b/820.bundle.js.map deleted file mode 100644 index b35040861..000000000 --- a/820.bundle.js.map +++ /dev/null @@ -1 +0,0 @@ -{"version":3,"file":"820.bundle.js","mappings":";4OAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,sMAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR9D,EACA,MAAQ,IAAG8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EACjC,YAAW+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACP,GAAEoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAO,wBAAuB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,WAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,WAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,WAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,GAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,WAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,GAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,GAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,GAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,YAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,GAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,GAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,WAAIkL,GACA,IAAIpD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK2M,2BAA2BvG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAImD,CAAQzH,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK4M,2BAA2BhF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAIiG,GACA,IAAIvD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8M,0BAA0B1G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIsD,CAAO5H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK+M,0BAA0BnF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIoG,GACA,IAAI1D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiN,4BAA4B7G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAIyD,CAAS/H,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKkN,4BAA4BtF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,gCAAgC/G,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,gCAAgCxF,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAOyG,GACH,IAAI/D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsN,iBAAiBlH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOgE,GACH,MAAM3M,EAAMZ,EAAKwN,uBACjB,OAAOf,EAASpE,OAAOzH,EAC/B,CAII,qBAAO6M,GACH,MAAM7M,EAAMZ,EAAK0N,0BACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,0BAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,+BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,uBACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,sBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,qBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,WAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,gBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,0BAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,+BACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,YAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,iBACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,uBAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,4BACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,iCAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,sCACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,2BACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,qCACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,sCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,oBAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,yBACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,GAGA,MAAMyO,GAA4D,oBAAzB9K,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsP,wBAAwB9N,IAAQ,YAK3E,MAAM+N,EAEF,aAAOlH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgH,EAAa/G,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB6N,GAAyB7K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuI,GAAyB5K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsP,wBAAwB9N,EACrC,CAKIuK,WAAAA,CAAYyD,GACR,IACI,MAAMpJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgN,EAAYxP,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKyP,iBAAiBrJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIqJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAMxJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmN,EAAY3P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBoN,EAAY5P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEkJ,EAAOhO,EACb7B,EAAK8P,0BAA0B1J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM4D,GACzE,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+P,sBAAsB3J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAW8F,GACd,IACI,MAAM5J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwN,EAAGhQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKiQ,wBAAwB7J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuI,EAAalH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM6J,GAA0D,oBAAzB3L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmQ,sBAAsB3O,IAAQ,YAIzE,MAAM4O,EAEF,aAAO/H,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6H,EAAW5H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0O,GAAuB1L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoJ,GAAuBzL,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmQ,sBAAsB3O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKqQ,iBAEjB,OADAzI,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO0I,CAAoBC,GACvB,MAAM9J,EAAOX,EAAkByK,EAAMvQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAKwQ,+BAA+B/J,EAAMG,GACtD,OAAOwJ,EAAW/H,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKyQ,uBAAuBrK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoJ,EAAW/H,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0Q,qBAAqBtK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIoH,WAAAA,GACI,MAAM/P,EAAMZ,EAAK4Q,uBAAuBhJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOIiQ,UAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,sBAAsBlJ,KAAKd,WAC5C,OAAOiK,EAAQ1I,OAAOzH,EAC9B,CASIoQ,IAAAA,CAAK5M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKiR,gBAAgBrJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOsQ,CAAaC,GAChB,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKoR,wBAAwBhL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqK,GAAqBhJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUIiL,YAAAA,CAAaH,GACT,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKuR,wBAAwBnL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqK,GAAqBhJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOmL,CAAyBC,EAAYN,GACxC,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAa8L,EAAYJ,IACzB,MAAM5K,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK0R,oCAAoCtL,EAAQqL,EAAW3K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoJ,EAAW/H,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMsL,GAAoE,oBAAzBpN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4R,gCAAgCpQ,IAAQ,YAInF,MAAMqQ,EAEF,aAAOxJ,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsJ,EAAqBrJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBmQ,GAAiCnN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6K,GAAiClN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4R,gCAAgCpQ,EAC7C,CAYI,wBAAOsQ,CAAkBlJ,EAAauI,GAClC,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKuR,wBAAwBnL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6K,EAAqBxJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI0L,mBAAAA,CAAoBZ,GAChB,IACI,MAAM/K,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2O,EAAQnR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKgS,yCAAyC5L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,GAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiS,8BAA8B7L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWuH,GACd,IACI,MAAMrL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiP,EAAYzR,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKkS,gCAAgC9L,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6K,EAAqBxJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM8L,GAAuD,oBAAzB5N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoS,mBAAmB5Q,IAAQ,YAItE,MAAM6Q,EAEF,aAAOhK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO8J,EAAQ7J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB2Q,GAAoB3N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqL,GAAoB1N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoS,mBAAmB5Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKsS,mBAAmBlM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqL,EAAQhK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKuS,iBAAiBnM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASIiJ,WAAAA,CAAYC,GACR,MAAMhM,EAAOjE,EAAkBiQ,EAAezS,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK0S,oBAAoB9K,KAAKd,UAAWL,EAAMG,EAEnE,CAuBI+L,YAAAA,GAEI,OAAOhS,EADKX,EAAK4S,qBAAqBhL,KAAKd,WAEnD,CAyCI+L,iBAAAA,CAAkBJ,GACd,IACI,MAAMrM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiQ,EAAezS,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAK8S,0BAA0B1M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI0M,WAAAA,GACI,IACI,MAAM3M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgT,oBAAoB5M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI4M,gBAAAA,CAAiBC,GACb,IACI,MAAM9M,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKmT,yBAAyB/M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDI+M,gBAAAA,CAAiBC,GACb,IACI,MAAMjN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6Q,EAAarT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKsT,yBAAyBlN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOkN,GACH,MAAM3S,EAAMZ,EAAKwT,4BACjB,OAAOnB,EAAQhK,OAAOzH,EAC9B,CAOI6S,EAAAA,GACI,IAAInK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0T,WAAWtN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK2T,gBAAgBvN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+J,EAAQ1I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIuN,OAAAA,CAAQC,GACJlO,EAAakO,EAAOxB,GAEpB,OAAe,IADHrS,EAAK8T,gBAAgBlM,KAAKd,UAAW+M,EAAM/M,UAE/D,CA0BIiN,UAAAA,GAEI,OAAOpT,EADKX,EAAKgU,mBAAmBpM,KAAKd,WAEjD,GAGA,MAAMmN,GAA8D,oBAAzB1P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkU,0BAA0B1S,IAAQ,YAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmN,GAA2BxP,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkU,0BAA0B1S,EACvC,CA8BI,iCAAO2S,CAA2BvL,EAAa1C,EAASkO,EAAaC,EAAYrV,EAAKsV,EAASC,EAAiBC,EAAmBC,GAC/H9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBzI,EAAOoI,EAAW5L,sBAEtB,IAAIkM,EAAO3R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9B6J,EAAON,EAAgB9L,sBAE3B,IAAIqM,EAAO,EACN9R,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChCuO,EAAON,EAAkB/L,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKiV,0CAA0CrM,EAAY9B,UAAWL,EAAMG,EAAMwN,EAAanI,EAAM0I,EAAMC,EAAM5R,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBhP,EAASoO,GAClC,MAAM7N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKmV,qCAAqC1O,EAAMG,EAAM5D,EAAWsR,GAAW,EAAI3S,EAAc2S,IAElH,CAaI,8BAAOc,CAAwB5R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKqV,uCAAuCjP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,OAAOC,OAAOC,QAAQ,GAAIzO,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOoP,CAAuB7M,EAAa1C,EAASwP,EAAWC,EAAQC,EAAiBC,EAAOvB,EAAStI,EAAa/F,EAAejH,EAAKyV,GACrI9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO,EACN3R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B2J,EAAO3I,EAAYvD,sBAEvB,IAAIoM,EAAO,EACN7R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BsO,EAAO5O,EAAcwC,sBAEzB,IAAIqM,EAAO9R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmP,EAAOjU,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAK+V,sCAAsCnN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAASC,EAAiBC,EAAO7S,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BpN,EAAa1C,EAASwP,EAAWC,EAAQvB,EAAaC,EAAYrV,EAAKsV,EAAStI,EAAa/F,EAAesO,EAAiBC,EAAmBC,GAC7K9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO,EACN3R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBC,EAAON,EAAW5L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFsP,EAAOpU,EACX,IAAIiT,EAAO,EACN9R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B8J,EAAO9I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIyN,EAAO,EACNlT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BkL,EAAO3B,EAAgB9L,sBAE3B,IAAI0N,EAAO,EACNnT,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChC4P,EAAO3B,EAAkB/L,sBAE7B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BoB,EAAO3B,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKqW,yCAAyCzN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMjT,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB1N,EAAa1C,EAASwP,EAAWC,EAAQ3W,EAAKsV,EAAStI,EAAa/F,EAAewO,GAC3G9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb,IAAI8S,EAAO3R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIqM,EAAO,EACN9R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BuO,EAAO7O,EAAcwC,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BD,EAAON,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKuW,oCAAoC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAAShB,EAAMC,EAAM5R,EAAWsR,GAAW,EAAI3S,EAAc2S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBtQ,EAASwP,GAChC,IACI,MAAMtP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBkT,EAAW1V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEkJ,EAAOhO,EACb7B,EAAKyW,mCAAmCrQ,EAAQK,EAAMG,EAAMqF,EAAM4D,GAClE,IAAI9I,EAAKG,IAAqBd,EAAS,EAAI,GACvCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,OAAOC,OAAOC,QAAQ,GAAIzO,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOqQ,CAAqB9N,EAAa+N,EAAUC,EAAUxC,EAAaC,EAAYrV,EAAK6X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjK9O,EAAaiD,EAAaC,IAC1BlD,EAAagR,EAAUjC,IACvB,IAAIjO,EAAOkQ,EAASlO,qBACpB9C,EAAaiR,EAAUlC,IACvB,IAAIzI,EAAO2K,EAASnO,qBACpB,IAAIkM,EAAO,EACN3R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBC,EAAON,EAAW5L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFsP,EAAOpU,EACX,IAAIiT,EAAO,EACN9R,EAAW6T,KACZlR,EAAakR,EAAkB7L,IAC/B8J,EAAO+B,EAAiBpO,sBAE5B,IAAIsM,EAAO,EACN/R,EAAW8T,KACZnR,EAAamR,EAAoBvQ,IACjCwO,EAAO+B,EAAmBrO,sBAE9B,IAAIyN,EAAO,EACNlT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BkL,EAAO3B,EAAgB9L,sBAE3B,IAAI0N,EAAO,EACNnT,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChC4P,EAAO3B,EAAkB/L,sBAE7B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BoB,EAAO3B,EAAchM,sBAGzB,OAAO9H,EADKX,EAAK+W,oCAAoCnO,EAAY9B,UAAWL,EAAMwF,EAAMmI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBpO,EAAaqO,EAAcC,EAAelY,EAAKmY,EAAmBC,EAAqB3C,GAChH9O,EAAaiD,EAAaC,IAC1BlD,EAAauR,EAAexC,IAC5B,IAAIjO,EAAOyQ,EAAczO,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACX,IAAI8S,EAAO,EACN3R,EAAWmU,KACZxR,EAAawR,EAAmBnM,IAChC2J,EAAOwC,EAAkB1O,sBAE7B,IAAIoM,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAqB7Q,IAClCsO,EAAOuC,EAAoB3O,sBAE/B,IAAIqM,EAAO,EACN9R,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5BF,EAAOL,EAAchM,sBAGzB,OAAO9H,EADKX,EAAKqX,qCAAqCzO,EAAY9B,UAAWmQ,EAAcxQ,EAAMwF,EAAM4D,EAAM8E,EAAME,EAAMC,GAEjI,CAiCI,+BAAOwC,CAAyB1O,EAAa2O,EAAgBC,EAAWC,EAAeC,EAAQR,EAAe9C,EAAaC,EAAYrV,EAAK2Y,EAAsBC,EAAwBrD,EAAiBC,EAAmBC,GAC1N9O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBgV,EAAWxX,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBiV,EAAezX,EAAK0G,kBAAmB1G,EAAK2G,oBACrEkJ,EAAOhO,EACb,IAAI8S,EAAO3R,EAAW0U,GAAU,EAAIlV,EAAkBkV,EAAQ1X,EAAK0G,kBAAmB1G,EAAK2G,oBACvFiO,EAAO/S,EACX,IAAIgT,EAAO,EACN7R,EAAWkU,KACZvR,EAAauR,EAAexC,IAC5BG,EAAOqC,EAAczO,sBAEzB,IAAIqM,EAAO,EACN9R,EAAWqR,KACZ1O,EAAa0O,EAAYK,IACzBI,EAAOT,EAAW5L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkR,EAAOhW,EACX,IAAIqU,EAAO,EACNlT,EAAW2U,KACZhS,EAAagS,EAAsB3M,IACnCkL,EAAOyB,EAAqBlP,sBAEhC,IAAI0N,EAAO,EACNnT,EAAW4U,KACZjS,EAAaiS,EAAwBrR,IACrC4P,EAAOyB,EAAuBnP,sBAElC,IAAI2N,EAAO,EACNpT,EAAWuR,KACZ5O,EAAa4O,EAAiBvJ,IAC9BoL,EAAO7B,EAAgB9L,sBAE3B,IAAIqP,EAAO,EACN9U,EAAWwR,KACZ7O,EAAa6O,EAAmBjO,IAChCuR,EAAOtD,EAAkB/L,sBAE7B,IAAIsP,EAAQ,EACP/U,EAAWyR,KACZ9O,EAAa8O,EAAeO,IAC5B+C,EAAQtD,EAAchM,sBAG1B,OAAO9H,EADKX,EAAKgY,wCAAwCpP,EAAY9B,UAAWyQ,EAAgB9Q,EAAMG,EAAMqF,EAAM4D,EAAM8E,EAAMC,EAAMC,EAAMT,EAAaU,EAAMC,EAAM8C,EAAM3B,EAAMC,EAAMC,EAAM0B,EAAMC,GAEzM,CAeI,wBAAOE,CAAkBrP,EAAa1C,EAASC,EAAawP,EAAQrB,GAChE3O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EAEb,OAAOlB,EADKX,EAAKkY,iCAAiCtP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,EAAMlO,EAAcgU,GAAS3S,EAAWsR,GAAW,EAAI3S,EAAc2S,IAExK,GAGA,MAAM6D,GAA0D,oBAAzB5T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoY,sBAAsB5W,IAAQ,YAIzE,MAAM6W,EAEF,aAAOhQ,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO8P,EAAW7P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB2W,GAAuB3T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqR,GAAuB1T,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoY,sBAAsB5W,EACnC,CAWI8W,kBAAAA,GAEI,OAAe,IADHtY,EAAKuY,8BAA8B3Q,KAAKd,UAE5D,CAWI0R,qBAAAA,GAEI,OAAe,IADHxY,EAAKyY,iCAAiC7Q,KAAKd,UAE/D,CAWI4R,yBAAAA,GAEI,OAAe,IADH1Y,EAAK2Y,qCAAqC/Q,KAAKd,UAEnE,CAWI8R,kBAAAA,GAEI,OAAe,IADH5Y,EAAK6Y,8BAA8BjR,KAAKd,UAE5D,CAWIgS,iBAAAA,GAEI,OAAe,IADH9Y,EAAK+Y,6BAA6BnR,KAAKd,UAE3D,CAWIkS,iBAAAA,GAEI,OAAe,IADHhZ,EAAKiZ,6BAA6BrR,KAAKd,UAE3D,CAWIoS,YAAAA,GAEI,OAAe,IADHlZ,EAAKmZ,wBAAwBvR,KAAKd,UAEtD,CAWIsS,yBAAAA,GAEI,OAAe,IADHpZ,EAAKqZ,qCAAqCzR,KAAKd,UAEnE,CAWIwS,aAAAA,GAEI,OAAe,IADHtZ,EAAKuZ,yBAAyB3R,KAAKd,UAEvD,CAWI0S,uBAAAA,GAEI,OAAe,IADHxZ,EAAKyZ,mCAAmC7R,KAAKd,UAEjE,CAWI4S,+BAAAA,GAEI,OAAe,IADH1Z,EAAK2Z,2CAA2C/R,KAAKd,UAEzE,CAWI8S,sBAAAA,GAEI,OAAe,IADH5Z,EAAK6Z,kCAAkCjS,KAAKd,UAEhE,CAWIgT,8BAAAA,GAEI,OAAe,IADH9Z,EAAK+Z,0CAA0CnS,KAAKd,UAExE,CAWIkT,+BAAAA,GAEI,OAAe,IADHha,EAAKia,2CAA2CrS,KAAKd,UAEzE,CAWIoT,oBAAAA,GAEI,OAAe,IADHla,EAAKma,gCAAgCvS,KAAKd,UAE9D,CAOIsT,QAAAA,GACI,IAAI9Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqa,oBAAoBjU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI+Q,IAAAA,GACI,MAAM1Z,EAAMZ,EAAKua,gBAAgB3S,KAAKd,WACtC,OAAOuR,EAAWhQ,OAAOzH,EACjC,CASI,gBAAO4Z,CAAUC,GACb,IACI,MAAMrU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB2U,EAAOza,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK0a,qBAAqBtU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqR,EAAWhQ,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWyQ,GACd,IACI,MAAMvU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmY,EAAQ3a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4a,sBAAsBxU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOqR,EAAWhQ,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIwU,OAAAA,GACI,IACI,MAAMzU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8a,mBAAmB1U,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,IAAIyF,EAAK3T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B+T,CACnB,CAAU,QACE/a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgb,oBAAoB5U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0R,GAAgE,oBAAzB1W,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkb,4BAA4B1Z,IAAQ,YAI/E,MAAM2Z,EAEF,aAAO9S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO4S,EAAiB3S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChByZ,GAA6BzW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmU,GAA6BxW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkb,4BAA4B1Z,EACzC,CASI,iBAAO0I,CAAWkR,GACd,IACI,MAAMhV,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Y,EAAQpb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKqb,4BAA4BjV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOmU,EAAiB9S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsb,0BAA0BlV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIgS,OAAAA,CAAQvS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKwb,yBAAyBpV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO0N,GAAgBrM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIoV,OAAAA,CAAQzS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAK0b,yBAAyB9T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM6U,GAA+D,oBAAzBpX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4b,2BAA2Bpa,IAAQ,YAI9E,MAAMqa,EAEF,aAAOxT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsT,EAAgBrT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBma,GAA4BnX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6U,GAA4BlX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4b,2BAA2Bpa,EACxC,CAMImO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAM9M,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkR,EAAY1T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EACb7B,EAAK8b,2BAA2B1V,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM4D,GAC1E,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+U,EAAM1T,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWkR,GACd,IACI,MAAMhV,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Y,EAAQpb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKgc,2BAA2B5V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6U,EAAgBxT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKic,yBAAyB7V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI2S,YAAAA,GACI,MAAMtb,EAAMZ,EAAKmc,6BAA6BvU,KAAKd,WACnD,OAAOyO,OAAOC,QAAQ,GAAI5U,EAClC,CAOIwb,KAAAA,GACI,IAAI9S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqc,sBAAsBjW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI+S,kBAAAA,CAAmB1T,EAAa8K,EAAYR,GACxC,IAAIqJ,EACAC,EACJ,IACI,MAAMpW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBkR,EAAY1T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB0Q,EAAalT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEkJ,EAAOhO,EACb7B,EAAKyc,mCAAmCrW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM4D,GACzG,IAAI9I,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GACpCsW,EAAKvZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACPkP,EAAOjP,EACX,GAAI0V,EAEA,MADA7H,EAAO,EAAGoB,EAAO,EACXtV,EAAW2U,GAIrB,OAFAiH,EAAc1H,EACd2H,EAAcvG,EACP1U,EAAmBsT,EAAMoB,EAC5C,CAAU,QACEjW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB8S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBpY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4c,qBAAqBpb,IAAQ,YAIxE,MAAMqb,EAEF,aAAOxU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsU,EAAUrU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBmb,GAAsBnY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6V,GAAsBlY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4c,qBAAqBpb,EAClC,CAWI,WAAOwP,CAAKpI,EAAaxE,GACrBuB,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKiR,gBAAgBrI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOiW,EAAUxU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS4R,GACtB,MAAMtK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK8c,iBAAiBlV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK+c,sBAAsBtW,EAAMG,GAC7C,OAAOiW,EAAUxU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgd,oBAAoB5W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAM0T,GAA2D,oBAAzB1Y,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKkd,uBAAuB1b,IAAQ,YAO1E,MAAM2b,EAEF,aAAO9U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO4U,EAAY3U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChByb,GAAwBzY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBmW,GAAwBxY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKkd,uBAAuB1b,EACpC,CASI,iBAAO0I,CAAWkT,GACd,IACI,MAAMhX,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4a,EAAapd,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqd,uBAAuBjX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOmW,EAAY9U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsd,qBAAqBlX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWIgU,aAAAA,GACI,IAAIjU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwd,0BAA0BpX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIkU,eAAAA,GACI,IAAInU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0d,4BAA4BtX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMoU,GAA4D,oBAAzBpZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK4d,wBAAwBpc,IAAQ,YAI3E,MAAMqc,EAEF,aAAOxV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsV,EAAarV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBmc,GAAyBnZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB6W,GAAyBlZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK4d,wBAAwBpc,EACrC,CAOI,yBAAOsc,GACH,MAAMld,EAAMZ,EAAK+d,kCACjB,OAAOF,EAAaxV,OAAOzH,EACnC,CAOI,4BAAOod,GACH,MAAMpd,EAAMZ,EAAKie,qCACjB,OAAOJ,EAAaxV,OAAOzH,EACnC,CAOI,gCAAOsd,GACH,MAAMtd,EAAMZ,EAAKme,yCACjB,OAAON,EAAaxV,OAAOzH,EACnC,CAOI,yBAAOwd,GACH,MAAMxd,EAAMZ,EAAKqe,kCACjB,OAAOR,EAAaxV,OAAOzH,EACnC,CAOI,wBAAO0d,GACH,MAAM1d,EAAMZ,EAAKue,iCACjB,OAAOV,EAAaxV,OAAOzH,EACnC,CAOI,wBAAO4d,GACH,MAAM5d,EAAMZ,EAAKye,iCACjB,OAAOZ,EAAaxV,OAAOzH,EACnC,CAOI,mBAAO8d,GACH,MAAM9d,EAAMZ,EAAK2e,4BACjB,OAAOd,EAAaxV,OAAOzH,EACnC,CAOI,gCAAOge,GACH,MAAMhe,EAAMZ,EAAK6e,yCACjB,OAAOhB,EAAaxV,OAAOzH,EACnC,CAOI,oBAAOke,GACH,MAAMle,EAAMZ,EAAK+e,6BACjB,OAAOlB,EAAaxV,OAAOzH,EACnC,CAOI,8BAAOoe,GACH,MAAMpe,EAAMZ,EAAKif,uCACjB,OAAOpB,EAAaxV,OAAOzH,EACnC,CAOI,sCAAOse,GACH,MAAMte,EAAMZ,EAAKmf,+CACjB,OAAOtB,EAAaxV,OAAOzH,EACnC,CAOI,6BAAOwe,GACH,MAAMxe,EAAMZ,EAAKqf,sCACjB,OAAOxB,EAAaxV,OAAOzH,EACnC,CAOI,qCAAO0e,GACH,MAAM1e,EAAMZ,EAAKuf,8CACjB,OAAO1B,EAAaxV,OAAOzH,EACnC,CAOI,sCAAO4e,GACH,MAAM5e,EAAMZ,EAAKyf,+CACjB,OAAO5B,EAAaxV,OAAOzH,EACnC,CAOI,2BAAO8e,GACH,MAAM9e,EAAMZ,EAAK2f,oCACjB,OAAO9B,EAAaxV,OAAOzH,EACnC,CAOIgf,oBAAAA,GAEI,OAAe,IADH5f,EAAK6f,kCAAkCjY,KAAKd,UAEhE,CAOIgZ,uBAAAA,GAEI,OAAe,IADH9f,EAAK+f,qCAAqCnY,KAAKd,UAEnE,CAOIkZ,2BAAAA,GAEI,OAAe,IADHhgB,EAAKigB,yCAAyCrY,KAAKd,UAEvE,CAOIoZ,oBAAAA,GAEI,OAAe,IADHlgB,EAAKmgB,kCAAkCvY,KAAKd,UAEhE,CAOIsZ,mBAAAA,GAEI,OAAe,IADHpgB,EAAKqgB,iCAAiCzY,KAAKd,UAE/D,CAOIwZ,mBAAAA,GAEI,OAAe,IADHtgB,EAAKugB,iCAAiC3Y,KAAKd,UAE/D,CAOI0Z,cAAAA,GAEI,OAAe,IADHxgB,EAAKygB,4BAA4B7Y,KAAKd,UAE1D,CAOI4Z,2BAAAA,GAEI,OAAe,IADH1gB,EAAK2gB,yCAAyC/Y,KAAKd,UAEvE,CAOI8Z,eAAAA,GAEI,OAAe,IADH5gB,EAAK6gB,6BAA6BjZ,KAAKd,UAE3D,CAOIga,yBAAAA,GAEI,OAAe,IADH9gB,EAAK+gB,uCAAuCnZ,KAAKd,UAErE,CAOIka,iCAAAA,GAEI,OAAe,IADHhhB,EAAKihB,+CAA+CrZ,KAAKd,UAE7E,CAOIoa,wBAAAA,GAEI,OAAe,IADHlhB,EAAKmhB,sCAAsCvZ,KAAKd,UAEpE,CAOIsa,gCAAAA,GAEI,OAAe,IADHphB,EAAKqhB,8CAA8CzZ,KAAKd,UAE5E,CAOIwa,iCAAAA,GAEI,OAAe,IADHthB,EAAKuhB,+CAA+C3Z,KAAKd,UAE7E,CAOI0a,sBAAAA,GAEI,OAAe,IADHxhB,EAAKyhB,oCAAoC7Z,KAAKd,UAElE,CAOIsT,QAAAA,GACI,IAAI9Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0hB,sBAAsBtb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI+Q,IAAAA,GACI,MAAM1Z,EAAMZ,EAAK2hB,kBAAkB/Z,KAAKd,WACxC,OAAO+W,EAAaxV,OAAOzH,EACnC,CASI,gBAAO4Z,CAAUC,GACb,IACI,MAAMrU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB2U,EAAOza,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK4hB,uBAAuBxb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6W,EAAaxV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWyQ,GACd,IACI,MAAMvU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmY,EAAQ3a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK6hB,wBAAwBzb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6W,EAAaxV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIwU,OAAAA,GACI,IACI,MAAMzU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,qBAAqB1b,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW2U,GAErB,IAAIyF,EAAK3T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B+T,CACnB,CAAU,QACE/a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+hB,sBAAsB3b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyY,GAAuD,oBAAzBzd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKiiB,mBAAmBzgB,IAAQ,YAGtE,MAAM0gB,EAEF,aAAO7Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2Z,EAAQ1Z,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBwgB,GAAoBxd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkb,GAAoBvd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKiiB,mBAAmBzgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK4Q,uBAAuBhI,EAAY9B,WACpD,OAAOob,EAAQ7Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKmiB,oBAAoB1b,EAAMG,GAC3C,OAAOsb,EAAQ7Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoiB,kBAAkBhc,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,UAAAA,GACI,MAAMjQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOiK,EAAQ1I,OAAOzH,EAC9B,CASI2a,OAAAA,CAAQ9J,GACJ,IAAI4Q,EACAC,EACJ,IACI,MAAMlc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBiP,EAAYzR,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKuiB,gBAAgBnc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCkP,EAAKnS,IAAkBiD,EAAS,EAAI,GACpCsW,EAAKvZ,IAAkBiD,EAAS,EAAI,GACpCuO,EAAO5N,EACP6N,EAAO5N,EACX,GAAI0V,EAEA,MADA/H,EAAO,EAAGC,EAAO,EACXjU,EAAW2U,GAIrB,OAFA+M,EAAc1N,EACd2N,EAAc1N,EACPrT,EAAmBoT,EAAMC,EAC5C,CAAU,QACE5U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB4Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,EAAWxjB,EAAQqV,GAC9B,GAAwB,mBAAboO,UAA2BzjB,aAAkByjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB3jB,EAAQqV,EAEtE,CAAc,MAAOzM,GACL,GAA0C,oBAAtC5I,EAAO4jB,QAAQje,IAAI,gBAInB,MAAMiD,EAHNib,QAAQC,KAAK,oMAAqMlb,EAKtO,CAGQ,MAAM4S,QAAcxb,EAAO+jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOnG,EAEpD,CAAW,CACH,MAAM1O,QAAiB+c,YAAYM,YAAYhkB,EAAQqV,GAEvD,OAAI1O,aAAoB+c,YAAYO,SACzB,CAAEtd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASud,IACL,MAAM7O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ8O,IAAIC,2BAA6B,SAASpe,GAC9CtE,EAAWsE,EACnB,EACIqP,EAAQ8O,IAAIE,2BAA6B,WAAa,OAAO5b,GAAY,WAErE,OAAO/F,EADK,IAAI4hB,eAExB,GAAOC,UAAU,EACblP,EAAQ8O,IAAIK,wCAA0C,WAAa,OAAO/b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMye,iBAAiBniB,EAAmB2D,EAAMO,GAClE,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIO,4BAA8B,WAAa,OAAOjc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM4b,EAAMC,GAC9GxjB,EAAU4E,GAAM6e,KAAKviB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM4b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACblP,EAAQ8O,IAAIW,4BAA8B,WAAa,OAAOrc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM+e,MACxB,GAAOR,UAAU,EACblP,EAAQ8O,IAAIa,gCAAkC,WAAa,OAAOvc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMif,SAEpC,GAAOV,UAAU,EACblP,EAAQ8O,IAAIe,8BAAgC,WAAa,OAAOzc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMmf,MAEpC,GAAOZ,UAAU,EACblP,EAAQ8O,IAAIiB,2BAA6B,WAErC,OAAO1iB,EADK,IAAI2G,OAExB,EACIgM,EAAQ8O,IAAIkB,sBAAwB,SAASrf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIoP,EAAQ8O,IAAImB,2BAA6B,WAAa,OAAO7c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY+e,QAAQniB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIqB,2BAA6B,WAAa,OAAO/c,GAAY,WAErE,OAAO/F,EADK,IAAI+iB,QAExB,GAAOlB,UAAU,EACblP,EAAQ8O,IAAIuB,4BAA8B,SAAS1f,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIqP,EAAQ8O,IAAIwB,2BAA6B,WAAa,OAAOld,GAAY,WAErE,OAAO/F,EADK,IAAIkjB,gBAExB,GAAOrB,UAAU,EACblP,EAAQ8O,IAAI0B,8BAAgC,SAAS7f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM8f,OAEpC,EACIzQ,EAAQ8O,IAAI4B,8BAAgC,WAAa,OAAOtd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM4b,GAC1GvjB,EAAU4E,GAAMggB,OAAO1jB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM4b,GACxF,GAAOJ,UAAU,EACblP,EAAQ8O,IAAI8B,2CAA6C,SAASjgB,GAC9D,IAAIkgB,EACJ,IACIA,EAAS9kB,EAAU4E,aAAiByd,QAChD,CAAU,MAAOve,GACLghB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI7Q,EAAQ8O,IAAIgC,8BAAgC,SAASngB,GAEjD,OADY5E,EAAU4E,GAAMmf,MAEpC,EACI9P,EAAQ8O,IAAIiC,2BAA6B,SAASpgB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIkC,+BAAiC,SAASrgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM4d,QAEpC,EACIvO,EAAQ8O,IAAImC,gCAAkC,WAE1C,OAAO5jB,EADK6jB,OAAOC,SAE3B,EACInR,EAAQ8O,IAAIsC,2BAA6B,WAAa,OAAOhe,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK6iB,QAAQ5f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOse,UAAU,EACblP,EAAQ8O,IAAIuC,uBAAyB,SAAS1gB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIqP,EAAQ8O,IAAIwC,4BAA8B,WAAa,OAAOle,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIyC,qBAAuB,SAAS5gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIgR,EAAQ8O,IAAI0C,4BAA8B,SAAS7gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM8gB,KAEpC,EACIzR,EAAQ8O,IAAI4C,4BAA8B,WAAa,OAAOte,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM8gB,OAEpC,GAAOvC,UAAU,EACblP,EAAQ8O,IAAI6C,4BAA8B,SAAShhB,GAE/C,OADY5E,EAAU4E,GAAMihB,IAEpC,EACI5R,EAAQ8O,IAAI+C,6BAA+B,SAASlhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMmhB,MAEpC,EACI9R,EAAQ8O,IAAIiD,6BAA+B,SAASphB,GAChD5E,EAAU4E,GAAMqhB,OACxB,EACIhS,EAAQ8O,IAAImD,iCAAmC,WAAa,OAAO7e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOue,UAAU,EACblP,EAAQ8O,IAAIoD,sBAAwB,SAASvhB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIqD,2BAA6B,SAASxhB,EAAMC,GACpD4d,QAAQ4D,IAAInlB,EAAmB0D,EAAMC,GAC7C,EACIoP,EAAQ8O,IAAIuD,2BAA6B,SAAS1hB,GAE9C,OAAOtD,EADK4T,OAAOC,QAAQ,GAAIvQ,GAEvC,EACIqP,EAAQ8O,IAAIwD,4BAA8B,WAAa,OAAOlf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO+d,UAAU,EACblP,EAAQ8O,IAAIyD,kBAAoB,SAAS5hB,GAErC,OAAOtD,EADKkJ,GAAQxC,OAAOpD,GAEnC,EACIqP,EAAQ8O,IAAI0D,kBAAoB,WAE5B,OAAOnlB,EADKolB,EAAWC,uBAE/B,EACI1S,EAAQ8O,IAAI6D,kBAAoB,WAE5B,OAAOtlB,EADK3B,EAAKd,OAEzB,EACIoV,EAAQ8O,IAAI8D,mCAAqC,SAASjiB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIsM,EAAQ8O,IAAI+D,4BAA8B,SAASliB,GAE/C,OAAOtD,EADKylB,EAAkB/e,OAAOpD,GAE7C,EACIqP,EAAQ8O,IAAIiE,sBAAwB,SAASpiB,GAEzC,OAAOtD,EADK2lB,GAAYjf,OAAOpD,GAEvC,EACIqP,EAAQ8O,IAAImE,qCAAuC,SAAStiB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIqP,EAAQ8O,IAAIoE,2BAA6B,SAASviB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI6O,EAAQ8O,IAAIqE,mBAAqB,SAASxiB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACIwP,EAAQ8O,IAAIsE,2BAA6B,WAErC,OAAO/lB,EADK,IAAIzB,MAExB,EACIoU,EAAQ8O,IAAIuE,4BAA8B,SAAS1iB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIoP,EAAQ8O,IAAIwE,mCAAqC,WAAa,OAAOlgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM+d,cAEpC,GAAOQ,UAAU,EACblP,EAAQ8O,IAAIyE,2BAA6B,SAAS5iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIqP,EAAQ8O,IAAI0E,8BAAgC,SAAS7iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI6T,EAAQ8O,IAAI2E,2BAA6B,SAAS9iB,EAAMC,GACpD,IACI,IAAI8iB,EAAS,CAACljB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN6oB,CAAChjB,EAAMC,KACb,MAAMJ,EAAIkjB,EAAOljB,EACjBkjB,EAAOljB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGkjB,EAAOjjB,EAAGE,EAAMC,EAChE,CAAkB,QACE8iB,EAAOljB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEonB,EAAOljB,EAAIkjB,EAAOjjB,EAAI,CAClC,CACA,EACIuP,EAAQ8O,IAAI8E,sBAAwB,SAASjjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIqP,EAAQ8O,IAAI+E,2BAA6B,WAErC,OAAOxmB,EADK,IAAIT,MAExB,EACIoT,EAAQ8O,IAAIgF,6BAA+B,SAASnjB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIiF,6BAA+B,SAASpjB,EAAMC,GACtD,IAAIojB,EACAC,EACJ,IACID,EAAcrjB,EACdsjB,EAAcrjB,EACd4d,QAAQ0F,MAAMjnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB6e,EAAaC,EAAa,EAC3D,CACA,EACIjU,EAAQ8O,IAAIqF,8BAAgC,SAASxjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACIiT,EAAQ8O,IAAIsF,kDAAoD,SAASzjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI6O,EAAQ8O,IAAIuF,sCAAwC,WAAa,OAAOjhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM2jB,eAAejoB,EAAWuE,GAClD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIyF,gCAAkC,SAAS5jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI6O,EAAQ8O,IAAI0F,uCAAyC,WAAa,OAAOphB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM8jB,gBAAgB1oB,EAAU6E,GAClD,GAAOse,UAAU,EACblP,EAAQ8O,IAAI4F,2BAA6B,SAAS/jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI6O,EAAQ8O,IAAI6F,8BAAgC,SAAShkB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMikB,OAEpC,EACI5U,EAAQ8O,IAAI+F,+BAAiC,SAASlkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMmkB,QAEpC,EACI9U,EAAQ8O,IAAIiG,gCAAkC,SAASpkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMqkB,SAEpC,EACIhV,EAAQ8O,IAAImG,4BAA8B,SAAStkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMukB,KAEpC,EACIlV,EAAQ8O,IAAIqG,qBAAuB,SAASxkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIqP,EAAQ8O,IAAIsG,+BAAiC,WAAa,OAAOhiB,GAAY,WAEzE,OAAO/F,EADK1C,OAAO0qB,QAE3B,GAAOnG,UAAU,EACblP,EAAQ8O,IAAIwG,gCAAkC,SAAS3kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM4kB,SAEpC,EACIvV,EAAQ8O,IAAI0G,qCAAuC,SAAS7kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIqP,EAAQ8O,IAAI2G,8BAAgC,SAAS9kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI6T,EAAQ8O,IAAI4G,2BAA6B,SAAS/kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIoP,EAAQ8O,IAAI6G,4BAA8B,WAAa,OAAOviB,GAAY,WAEtE,OAAO/F,EADKuoB,KAAKA,KAEzB,GAAO1G,UAAU,EACblP,EAAQ8O,IAAI+G,8BAAgC,WAAa,OAAOziB,GAAY,WAExE,OAAO/F,EADKyoB,OAAOA,OAE3B,GAAO5G,UAAU,EACblP,EAAQ8O,IAAIiH,kCAAoC,WAAa,OAAO3iB,GAAY,WAE5E,OAAO/F,EADK2oB,WAAWA,WAE/B,GAAO9G,UAAU,EACblP,EAAQ8O,IAAImH,8BAAgC,WAAa,OAAO7iB,GAAY,WAExE,OAAO/F,EADK6oB,OAAOA,OAE3B,GAAOhH,UAAU,EACblP,EAAQ8O,IAAIqH,wBAA0B,SAASxlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIqP,EAAQ8O,IAAIsH,iCAAmC,SAASzlB,EAAMC,GAE1D,OAAOvD,EADK,IAAIgpB,SAASppB,EAAmB0D,EAAMC,IAE1D,EACIoP,EAAQ8O,IAAIwH,2BAA6B,WAAa,OAAOljB,GAAY,SAAUzC,EAAMC,GAErF,OADYsf,QAAQqG,IAAIxqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOse,UAAU,EACblP,EAAQ8O,IAAI0H,6BAA+B,SAAS7lB,GAEhD,OAAOtD,EADKopB,MAAM1qB,EAAU4E,IAEpC,EACIqP,EAAQ8O,IAAI4H,6BAA+B,SAAS/lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM8lB,MAAM1qB,EAAU6E,IAEpD,EACIoP,EAAQ8O,IAAI6H,wBAA0B,SAAShmB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAI8H,iBAAmB,SAASjmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIoP,EAAQ8O,IAAI+H,mBAAqB,SAASlmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIqP,EAAQ8O,IAAIgI,4BAA8B,SAASnmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMomB,KAAKhrB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI6O,EAAQ8O,IAAIkI,4BAA8B,SAASrmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMomB,KAAKhrB,EAAU6E,IAEnD,EACIoP,EAAQ8O,IAAImI,sCAAwC,SAAStmB,GACzDumB,eAAenrB,EAAU4E,GACjC,EACIqP,EAAQ8O,IAAIqI,sCAAwC,SAASxmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMumB,eAEpC,EACIlX,EAAQ8O,IAAIsI,+BAAiC,SAASzmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIqP,EAAQ8O,IAAIuI,iCAAmC,WAE3C,OAAOhqB,EADKiqB,QAAQC,UAE5B,EACIvX,EAAQ8O,IAAI0I,2BAA6B,SAAS7mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIqP,EAAQ8O,IAAI2I,iCAAmC,SAAS9mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKiqB,QAAQC,UAAUxrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI6O,EAAQ8O,IAAI4I,6BAA+B,SAAS/mB,GAEhD,OADY5E,EAAU4E,GAAMud,KAEpC,EACIlO,EAAQ8O,IAAI6I,6BAA+B,SAAShnB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMmhB,MAEpC,EACI9R,EAAQ8O,IAAI8I,iCAAmC,SAASjnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC2pB,mBAAoB,6OAO7BnsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DkJ,EAAOhO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIqI,EAAQ8O,IAAIgJ,2BAA6B,WAAa,OAAO1kB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOse,UAAU,EACblP,EAAQ8O,IAAIiJ,oCAAsC,SAASpnB,EAAMC,GAC7D7E,EAAU4E,GAAMqnB,UAAYjsB,EAAU6E,EAC9C,EACIoP,EAAQ8O,IAAImJ,0BAA4B,SAAStnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMssB,GAAGnsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI6O,EAAQ8O,IAAIqJ,mCAAqC,WAAa,OAAO/kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOse,UAAU,EACblP,EAAQ8O,IAAIsJ,4BAA8B,SAASznB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM0nB,KAEpC,EACIrY,EAAQ8O,IAAIwJ,yCAA2C,WAAa,OAAOllB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIkrB,QAAQtrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO+d,UAAU,EACblP,EAAQ8O,IAAI0J,oCAAsC,WAAa,OAAOplB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM6nB,aAC5B,IAAI9gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFkJ,EAAOhO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK4K,EAClC1M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOuX,UAAU,EACblP,EAAQ8O,IAAI4J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACI8O,EAAQ8O,IAAI6J,+BAAiC,SAAShoB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEW8O,CACX,CAEA,SAAS4Y,EAAkB5Y,EAAS6Y,GAChC7Y,EAAQ8O,IAAIlkB,OAASiuB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoB5nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS6nB,QAChB1G,EAAWC,uBAAyB/nB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAK0tB,mBACE1tB,CACX,CAEA,SAAS2tB,EAAS1uB,EAAQkuB,GACtB,QAAa/sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMsU,EAAU6O,IAEhB+J,EAAkB5Y,EAAS6Y,GAErBluB,aAAkB0jB,YAAYiL,SAChC3uB,EAAS,IAAI0jB,YAAYiL,OAAO3uB,IAKpC,OAAOuuB,EAFU,IAAI7K,YAAYO,SAASjkB,EAAQqV,GAEbrV,EACzC,CAEAujB,eAAeuE,EAAW8G,EAAOV,GAC7B,QAAa/sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMsU,EAAU6O,KAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,EAAkB5Y,EAAS6Y,GAE3B,MAAM,SAAEvnB,EAAQ,OAAE3G,SAAiBwjB,QAAiBoL,EAAOvZ,GAE3D,OAAOkZ,EAAoB5nB,EAAU3G,EACzC,CAEA,IAAIwuB,EAAuBnlB,OAAOylB,OAAO,CACrCC,UAAW,KACX5lB,QAAS2I,EACT/G,UAAW1D,EACXgE,kBAAmB8c,EACnB3b,MAAOsQ,EACPlR,QAASA,GACT4B,SAAUwhB,GACV1e,aAAcyF,GACd5E,WAAYvH,GACZgJ,qBAAsBR,GACtBgB,QAAS7L,GACT0nB,eAAgBC,GAChB9V,WAAYrN,GACZmQ,iBAAkBiT,GAClBvS,gBAAiBnH,GACjBmI,UAAWjT,GACXuT,YAAamK,GACbzJ,aAActX,GACd2b,QAASjZ,GACTolB,QAAStH,EACT4G,SAAUA,EACVlmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMuoB,GAAY,wBCp6Ib,MACD7mB,eAAgB8mB,GAAkB,QAClCnmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACR8C,GAAY,QACZif,GAAO,WACPpe,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACPgG,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZhX,SDm5IoB2b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY9qB,KAAKgrB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAe7H,EAAY8H,SAG3B9H,EAAW8H,GAGdpB,CAAO,ECt6IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,eAIvBtL,eAAe/a,EAAesnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIT,IAAI,aAA+BiB,EACpE,6DChCA,MAAMI,EAAc3J,OAAO,iBACrB4J,EAAiB5J,OAAO,oBACxB6J,EAAe7J,OAAO,wBACtB8J,EAAY9J,OAAO,qBACnB+J,EAAc/J,OAAO,kBACrBgK,EAAYlsB,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEmsB,EAAmB,IAAIC,IAAI,CAC7B,CAAC,QA7CwB,CACzBC,UAAYrsB,GAAQksB,EAASlsB,IAAQA,EAAI6rB,GACzC,SAAAS,CAAUhuB,GACN,MAAM,MAAEiuB,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAC,EAAOpuB,EAAKiuB,GACL,CAACC,EAAO,CAACA,GACpB,EACAG,YAAYC,IACRA,EAAKC,QACEC,EAAKF,MAqChB,CAAC,QA/BwB,CACzBP,UAAYvJ,GAAUoJ,EAASpJ,IAAUmJ,KAAenJ,EACxD,SAAAwJ,EAAU,MAAExJ,IACR,IAAIiK,EAcJ,OAZIA,EADAjK,aAAiBllB,MACJ,CACTovB,SAAS,EACTlK,MAAO,CACHhiB,QAASgiB,EAAMhiB,QACfZ,KAAM4iB,EAAM5iB,KACZa,MAAO+hB,EAAM/hB,QAKR,CAAEisB,SAAS,EAAOlK,SAE5B,CAACiK,EAAY,GACxB,EACA,WAAAJ,CAAYI,GACR,GAAIA,EAAWC,QACX,MAAMhoB,OAAOioB,OAAO,IAAIrvB,MAAMmvB,EAAWjK,MAAMhiB,SAAUisB,EAAWjK,OAExE,MAAMiK,EAAWjK,KACrB,MAoBJ,SAAS4J,EAAOpuB,EAAK4uB,EAAKlG,WAAYmG,EAAiB,CAAC,MACpDD,EAAG/wB,iBAAiB,WAAW,SAASixB,EAASC,GAC7C,IAAKA,IAAOA,EAAGhE,KACX,OAEJ,IAhBR,SAAyB8D,EAAgBG,GACrC,IAAK,MAAMC,KAAiBJ,EAAgB,CACxC,GAAIG,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBP,EAAgBE,EAAGC,QAEpC,YADA9N,QAAQC,KAAK,mBAAmB4N,EAAGC,6BAGvC,MAAM,GAAEnd,EAAE,KAAEjU,EAAI,KAAEyxB,GAAS3oB,OAAOioB,OAAO,CAAEU,KAAM,IAAMN,EAAGhE,MACpDuE,GAAgBP,EAAGhE,KAAKuE,cAAgB,IAAIC,IAAIC,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASL,EAAKvvB,MAAM,GAAI,GAAG6vB,QAAO,CAAC3vB,EAAK4vB,IAAS5vB,EAAI4vB,IAAO5vB,GAC5D6vB,EAAWR,EAAKM,QAAO,CAAC3vB,EAAK4vB,IAAS5vB,EAAI4vB,IAAO5vB,GACvD,OAAQpC,GACJ,IAAK,MAEG6xB,EAAcI,EAElB,MACJ,IAAK,MAEGH,EAAOL,EAAKvvB,OAAO,GAAG,IAAM0vB,EAAcT,EAAGhE,KAAKvG,OAClDiL,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcI,EAAS9pB,MAAM2pB,EAAQJ,GAEzC,MACJ,IAAK,YAGGG,EA6KxB,SAAezvB,GACX,OAAO0G,OAAOioB,OAAO3uB,EAAK,CAAE,CAACutB,IAAc,GAC/C,CA/KsCuC,CADA,IAAID,KAAYP,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAErB,EAAK,MAAEC,GAAU,IAAIC,eAC7BC,EAAOpuB,EAAKkuB,GACZuB,EAkKxB,SAAkBzvB,EAAK+vB,GAEnB,OADAC,EAAcvvB,IAAIT,EAAK+vB,GAChB/vB,CACX,CArKsCiwB,CAAShC,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGwB,OAAcjxB,EAElB,MACJ,QACI,OAEZ,CACA,MAAOgmB,GACHiL,EAAc,CAAEjL,QAAO,CAACmJ,GAAc,EAC1C,CACAnwB,QAAQC,QAAQgyB,GACXS,OAAO1L,IACD,CAAEA,QAAO,CAACmJ,GAAc,MAE9BlE,MAAMgG,IACP,MAAOU,EAAWC,GAAiBC,EAAYZ,GAC/Cb,EAAGzwB,YAAYuI,OAAOioB,OAAOjoB,OAAOioB,OAAO,CAAC,EAAGwB,GAAY,CAAEte,OAAOue,GACvD,YAATxyB,IAEAgxB,EAAG0B,oBAAoB,UAAWxB,GAClCyB,EAAc3B,GACVlB,KAAa1tB,GAAiC,mBAAnBA,EAAI0tB,IAC/B1tB,EAAI0tB,KAEZ,IAECwC,OAAOtJ,IAER,MAAOuJ,EAAWC,GAAiBC,EAAY,CAC3C7L,MAAO,IAAIgM,UAAU,+BACrB,CAAC7C,GAAc,IAEnBiB,EAAGzwB,YAAYuI,OAAOioB,OAAOjoB,OAAOioB,OAAO,CAAC,EAAGwB,GAAY,CAAEte,OAAOue,EAAc,GAE1F,IACIxB,EAAGL,OACHK,EAAGL,OAEX,CAIA,SAASgC,EAAcE,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAAStmB,YAAYvI,IAChC,EAEQ8uB,CAAcD,IACdA,EAASE,OACjB,CACA,SAASnC,EAAKI,EAAIgC,GACd,OAAOC,EAAYjC,EAAI,GAAIgC,EAC/B,CACA,SAASE,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIzxB,MAAM,6CAExB,CACA,SAAS0xB,EAAgBpC,GACrB,OAAOqC,EAAuBrC,EAAI,CAC9BhxB,KAAM,YACP6rB,MAAK,KACJ8G,EAAc3B,EAAG,GAEzB,CACA,MAAMsC,EAAe,IAAIC,QACnBC,EAAkB,yBAA0B1I,YAC9C,IAAI/lB,sBAAsBisB,IACtB,MAAMyC,GAAYH,EAAaluB,IAAI4rB,IAAO,GAAK,EAC/CsC,EAAazwB,IAAImuB,EAAIyC,GACJ,IAAbA,GACAL,EAAgBpC,EACpB,IAcR,SAASiC,EAAYjC,EAAIS,EAAO,GAAIuB,EAAS,WAAc,GACvD,IAAIU,GAAkB,EACtB,MAAMxB,EAAQ,IAAIyB,MAAMX,EAAQ,CAC5B,GAAA5tB,CAAIwuB,EAAS5B,GAET,GADAkB,EAAqBQ,GACjB1B,IAASnC,EACT,MAAO,MAXvB,SAAyBqC,GACjBsB,GACAA,EAAgBvuB,WAAWitB,EAEnC,CAQoB2B,CAAgB3B,GAChBkB,EAAgBpC,GAChB0C,GAAkB,CAAI,EAG9B,GAAa,SAAT1B,EAAiB,CACjB,GAAoB,IAAhBP,EAAKxwB,OACL,MAAO,CAAE4qB,KAAM,IAAMqG,GAEzB,MAAM4B,EAAIT,EAAuBrC,EAAI,CACjChxB,KAAM,MACNyxB,KAAMA,EAAKE,KAAKoC,GAAMA,EAAEzvB,eACzBunB,KAAK+F,GACR,OAAOkC,EAAEjI,KAAKmI,KAAKF,EACvB,CACA,OAAOb,EAAYjC,EAAI,IAAIS,EAAMO,GACrC,EACA,GAAAnvB,CAAI+wB,EAAS5B,EAAMC,GACfiB,EAAqBQ,GAGrB,MAAO9M,EAAO4L,GAAiBC,EAAYR,GAC3C,OAAOoB,EAAuBrC,EAAI,CAC9BhxB,KAAM,MACNyxB,KAAM,IAAIA,EAAMO,GAAML,KAAKoC,GAAMA,EAAEzvB,aACnCsiB,SACD4L,GAAe3G,KAAK+F,EAC3B,EACA,KAAAzpB,CAAMyrB,EAASK,EAAUC,GACrBhB,EAAqBQ,GACrB,MAAMS,EAAO1C,EAAKA,EAAKxwB,OAAS,GAChC,GAAIkzB,IAASvE,EACT,OAAOyD,EAAuBrC,EAAI,CAC9BhxB,KAAM,aACP6rB,KAAK+F,GAGZ,GAAa,SAATuC,EACA,OAAOlB,EAAYjC,EAAIS,EAAKvvB,MAAM,GAAI,IAE1C,MAAOwvB,EAAcc,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBrC,EAAI,CAC9BhxB,KAAM,QACNyxB,KAAMA,EAAKE,KAAKoC,GAAMA,EAAEzvB,aACxBotB,gBACDc,GAAe3G,KAAK+F,EAC3B,EACA,SAAAyC,CAAUT,EAASM,GACfhB,EAAqBQ,GACrB,MAAOhC,EAAcc,GAAiB4B,EAAiBF,GACvD,OAAOb,EAAuBrC,EAAI,CAC9BhxB,KAAM,YACNyxB,KAAMA,EAAKE,KAAKoC,GAAMA,EAAEzvB,aACxBotB,gBACDc,GAAe3G,KAAK+F,EAC3B,IAGJ,OA7EJ,SAAuBM,EAAOlB,GAC1B,MAAMyC,GAAYH,EAAaluB,IAAI4rB,IAAO,GAAK,EAC/CsC,EAAazwB,IAAImuB,EAAIyC,GACjBD,GACAA,EAAgBxuB,SAASktB,EAAOlB,EAAIkB,EAE5C,CAsEIoC,CAAcpC,EAAOlB,GACdkB,CACX,CAIA,SAASkC,EAAiB1C,GACtB,MAAM6C,EAAY7C,EAAaC,IAAIc,GACnC,MAAO,CAAC8B,EAAU5C,KAAK6C,GAAMA,EAAE,MALnBC,EAK+BF,EAAU5C,KAAK6C,GAAMA,EAAE,KAJ3D9zB,MAAMsI,UAAU0rB,OAAOvsB,MAAM,GAAIssB,KAD5C,IAAgBA,CAMhB,CACA,MAAMrC,EAAgB,IAAImB,QAe1B,SAASd,EAAY7L,GACjB,IAAK,MAAO5iB,EAAM2wB,KAAY1E,EAC1B,GAAI0E,EAAQxE,UAAUvJ,GAAQ,CAC1B,MAAOgO,EAAiBpC,GAAiBmC,EAAQvE,UAAUxJ,GAC3D,MAAO,CACH,CACI5mB,KAAM,UACNgE,OACA4iB,MAAOgO,GAEXpC,EAER,CAEJ,MAAO,CACH,CACIxyB,KAAM,MACN4mB,SAEJwL,EAAchtB,IAAIwhB,IAAU,GAEpC,CACA,SAASgL,EAAchL,GACnB,OAAQA,EAAM5mB,MACV,IAAK,UACD,OAAOiwB,EAAiB7qB,IAAIwhB,EAAM5iB,MAAMysB,YAAY7J,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAASyM,EAAuBrC,EAAI6D,EAAK1C,GACrC,OAAO,IAAIvyB,SAASC,IAChB,MAAMoU,EAeH,IAAIvT,MAAM,GACZC,KAAK,GACLgxB,KAAI,IAAMmD,KAAKC,MAAMD,KAAKE,SAAWC,OAAOC,kBAAkB5wB,SAAS,MACvEqK,KAAK,KAjBNqiB,EAAG/wB,iBAAiB,WAAW,SAASk1B,EAAEhE,GACjCA,EAAGhE,MAASgE,EAAGhE,KAAKlZ,IAAMkd,EAAGhE,KAAKlZ,KAAOA,IAG9C+c,EAAG0B,oBAAoB,UAAWyC,GAClCt1B,EAAQsxB,EAAGhE,MACf,IACI6D,EAAGL,OACHK,EAAGL,QAEPK,EAAGzwB,YAAYuI,OAAOioB,OAAO,CAAE9c,MAAM4gB,GAAM1C,EAAU,GAE7D","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js","webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_279(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {string | undefined} caller\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, caller, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(caller) ? 0 : passStringToWasm0(caller, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr3 = amount_record.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr4 = fee_record.__destroy_into_raw();\n }\n var ptr5 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len5 = WASM_VECTOR_LEN;\n let ptr6 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr6 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr7 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr8 = fee_proving_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr9 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr10 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr10 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, len2, ptr3, fee_credits, ptr4, ptr5, len5, ptr6, ptr7, ptr8, ptr9, ptr10);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_279(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5763 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5788 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n","/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_279","arg3","wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","caller","transfer_proving_key","transfer_verifying_key","len5","ptr9","ptr10","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","log","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_transaction_new","Transaction$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5763","__wbindgen_closure_wrapper5788","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info","proxyMarker","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","transferHandlers","Map","canHandle","serialize","port1","port2","MessageChannel","expose","deserialize","port","start","wrap","serialized","isError","assign","ep","allowedOrigins","callback","ev","origin","allowedOrigin","RegExp","test","isAllowedOrigin","path","argumentList","map","fromWireValue","returnValue","parent","reduce","prop","rawValue","proxy","transfers","transferCache","transfer","catch","wireValue","transferables","toWireValue","removeEventListener","closeEndPoint","TypeError","endpoint","isMessagePort","close","target","createProxy","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","newCount","isProxyReleased","Proxy","_target","unregisterProxy","r","p","bind","_thisArg","rawArgumentList","last","processArguments","construct","registerProxy","processed","v","arr","concat","handler","serializedValue","msg","Math","floor","random","Number","MAX_SAFE_INTEGER","l"],"sourceRoot":""} \ No newline at end of file diff --git a/825.bundle.js b/825.bundle.js new file mode 100644 index 000000000..fb0070b9f --- /dev/null +++ b/825.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={825:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=825.bundle.js.map \ No newline at end of file diff --git a/825.bundle.js.map b/825.bundle.js.map new file mode 100644 index 000000000..fd392131e --- /dev/null +++ b/825.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"825.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t825: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/876.bundle.js b/876.bundle.js new file mode 100644 index 000000000..506ceae0f --- /dev/null +++ b/876.bundle.js @@ -0,0 +1,3 @@ +/*! For license information please see 876.bundle.js.LICENSE.txt */ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[876,495],{720:(e,r,t)=>{t.d(r,{LV:()=>f});const i=Symbol("Comlink.proxy"),n=Symbol("Comlink.endpoint"),a=Symbol("Comlink.releaseProxy"),o=Symbol("Comlink.finalizer"),s=Symbol("Comlink.thrown"),c=e=>"object"==typeof e&&null!==e||"function"==typeof e,u=new Map([["proxy",{canHandle:e=>c(e)&&e[i],serialize(e){const{port1:r,port2:t}=new MessageChannel;return h(e,r),[t,[t]]},deserialize:e=>(e.start(),f(e))}],["throw",{canHandle:e=>c(e)&&s in e,serialize({value:e}){let r;return r=e instanceof Error?{isError:!0,value:{message:e.message,name:e.name,stack:e.stack}}:{isError:!1,value:e},[r,[]]},deserialize(e){if(e.isError)throw Object.assign(new Error(e.value.message),e.value);throw e.value}}]]);function h(e,r=globalThis,t=["*"]){r.addEventListener("message",(function n(a){if(!a||!a.data)return;if(!function(e,r){for(const t of e){if(r===t||"*"===t)return!0;if(t instanceof RegExp&&t.test(r))return!0}return!1}(t,a.origin))return void console.warn(`Invalid origin '${a.origin}' for comlink proxy`);const{id:c,type:u,path:f}=Object.assign({path:[]},a.data),y=(a.data.argumentList||[]).map(P);let d;try{const r=f.slice(0,-1).reduce(((e,r)=>e[r]),e),t=f.reduce(((e,r)=>e[r]),e);switch(u){case"GET":d=t;break;case"SET":r[f.slice(-1)[0]]=P(a.data.value),d=!0;break;case"APPLY":d=t.apply(r,y);break;case"CONSTRUCT":d=function(e){return Object.assign(e,{[i]:!0})}(new t(...y));break;case"ENDPOINT":{const{port1:r,port2:t}=new MessageChannel;h(e,t),d=function(e,r){return w.set(e,r),e}(r,[r])}break;case"RELEASE":d=void 0;break;default:return}}catch(e){d={value:e,[s]:0}}Promise.resolve(d).catch((e=>({value:e,[s]:0}))).then((t=>{const[i,a]=m(t);r.postMessage(Object.assign(Object.assign({},i),{id:c}),a),"RELEASE"===u&&(r.removeEventListener("message",n),l(r),o in e&&"function"==typeof e[o]&&e[o]())})).catch((e=>{const[t,i]=m({value:new TypeError("Unserializable return value"),[s]:0});r.postMessage(Object.assign(Object.assign({},t),{id:c}),i)}))})),r.start&&r.start()}function l(e){(function(e){return"MessagePort"===e.constructor.name})(e)&&e.close()}function f(e,r){return g(e,[],r)}function y(e){if(e)throw new Error("Proxy has been released and is not useable")}function d(e){return _(e,{type:"RELEASE"}).then((()=>{l(e)}))}const p=new WeakMap,v="FinalizationRegistry"in globalThis&&new FinalizationRegistry((e=>{const r=(p.get(e)||0)-1;p.set(e,r),0===r&&d(e)}));function g(e,r=[],t=function(){}){let i=!1;const o=new Proxy(t,{get(t,n){if(y(i),n===a)return()=>{!function(e){v&&v.unregister(e)}(o),d(e),i=!0};if("then"===n){if(0===r.length)return{then:()=>o};const t=_(e,{type:"GET",path:r.map((e=>e.toString()))}).then(P);return t.then.bind(t)}return g(e,[...r,n])},set(t,n,a){y(i);const[o,s]=m(a);return _(e,{type:"SET",path:[...r,n].map((e=>e.toString())),value:o},s).then(P)},apply(t,a,o){y(i);const s=r[r.length-1];if(s===n)return _(e,{type:"ENDPOINT"}).then(P);if("bind"===s)return g(e,r.slice(0,-1));const[c,u]=b(o);return _(e,{type:"APPLY",path:r.map((e=>e.toString())),argumentList:c},u).then(P)},construct(t,n){y(i);const[a,o]=b(n);return _(e,{type:"CONSTRUCT",path:r.map((e=>e.toString())),argumentList:a},o).then(P)}});return function(e,r){const t=(p.get(r)||0)+1;p.set(r,t),v&&v.register(e,r,e)}(o,e),o}function b(e){const r=e.map(m);return[r.map((e=>e[0])),(t=r.map((e=>e[1])),Array.prototype.concat.apply([],t))];var t}const w=new WeakMap;function m(e){for(const[r,t]of u)if(t.canHandle(e)){const[i,n]=t.serialize(e);return[{type:"HANDLER",name:r,value:i},n]}return[{type:"RAW",value:e},w.get(e)||[]]}function P(e){switch(e.type){case"HANDLER":return u.get(e.name).deserialize(e.value);case"RAW":return e.value}}function _(e,r,t){return new Promise((i=>{const n=new Array(4).fill(0).map((()=>Math.floor(Math.random()*Number.MAX_SAFE_INTEGER).toString(16))).join("-");e.addEventListener("message",(function r(t){t.data&&t.data.id&&t.data.id===n&&(e.removeEventListener("message",r),i(t.data))})),e.start&&e.start(),e.postMessage(Object.assign({id:n},r),t)}))}},495:(e,r,t)=>{t.a(e,(async(e,i)=>{try{t.r(r),t.d(r,{Account:()=>s,Address:()=>n.pV,AleoKeyProvider:()=>f,AleoKeyProviderParams:()=>l,AleoNetworkClient:()=>h,BlockHeightSearch:()=>v,CREDITS_PROGRAM_KEYS:()=>k,ExecutionResponse:()=>n.qp,Field:()=>n.D0,FunctionExecution:()=>n.Zc,KEY_STORE:()=>_,NetworkRecordProvider:()=>p,OfflineKeyProvider:()=>d,OfflineQuery:()=>n.c7,OfflineSearchParams:()=>y,PRIVATE_TO_PUBLIC_TRANSFER:()=>C,PRIVATE_TRANSFER:()=>S,PRIVATE_TRANSFER_TYPES:()=>E,PUBLIC_TO_PRIVATE_TRANSFER:()=>A,PUBLIC_TRANSFER:()=>B,PUBLIC_TRANSFER_AS_SIGNER:()=>R,PrivateKey:()=>n.ZD,PrivateKeyCiphertext:()=>n.LW,Program:()=>n.BP,ProgramManager:()=>w,ProgramManagerBase:()=>n.Ao,ProvingKey:()=>n.$7,RecordCiphertext:()=>n.KC,RecordPlaintext:()=>n.ZF,Signature:()=>n.to,Transaction:()=>n.ZX,VALID_TRANSFER_TYPES:()=>T,VerifyingKey:()=>n.pF,ViewKey:()=>n.hv,createAleoWorker:()=>b,initThreadPool:()=>n.Fs,initializeWasm:()=>V,logAndThrow:()=>F,verifyFunctionExecution:()=>n.Yc});var n=t(877),a=t(720),o=e([n]);n=(o.then?(await o)():o)[0];class s{_privateKey;_viewKey;_address;constructor(e={}){try{this._privateKey=this.privateKeyFromParams(e)}catch(e){throw console.error("Wrong parameter",e),new Error("Wrong Parameter")}this._viewKey=n.hv.from_private_key(this._privateKey),this._address=n.pV.from_private_key(this._privateKey)}static fromCiphertext(e,r){try{e="string"==typeof e?n.LW.fromString(e):e;const t=n.ZD.fromPrivateKeyCiphertext(e,r);return new s({privateKey:t.to_string()})}catch(e){throw new Error("Wrong password or invalid ciphertext")}}privateKeyFromParams(e){return e.seed?n.ZD.from_seed_unchecked(e.seed):e.privateKey?n.ZD.from_string(e.privateKey):new n.ZD}privateKey(){return this._privateKey}viewKey(){return this._viewKey}address(){return this._address}toString(){return this.address().to_string()}encryptAccount(e){return this._privateKey.toCiphertext(e)}decryptRecord(e){return this._viewKey.decrypt(e)}decryptRecords(e){return e.map((e=>this._viewKey.decrypt(e)))}ownsRecordCiphertext(e){if("string"!=typeof e)return e.isOwner(this._viewKey);try{return n.KC.fromString(e).isOwner(this._viewKey)}catch(e){return!1}}sign(e){return this._privateKey.sign(e)}verify(e,r){return this._address.verify(e,r)}}async function c(e,r){const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not get URL "+e);return t}async function u(e,r){r.method="POST";const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not post URL "+e);return t}class h{host;headers;account;constructor(e,r){this.host=e+"/testnet",r&&r.headers?this.headers=r.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const r=await c(this.host+e,{headers:this.headers});return await r.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,r,t,i,a,o){if(o=o||[],e<0)throw new Error("Start height must be greater than or equal to 0");const s=new Array;let c,u,h,l,f=0,y=BigInt(0);if(void 0===t){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");h=this.account._privateKey}else try{h=t instanceof n.ZD?t:n.ZD.from_string(t)}catch(e){throw new Error("Error parsing private key provided.")}const d=h.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");l=e}catch(e){throw new Error("Error fetching latest block height.")}if(u="number"==typeof r&&r<=l?r:l,e>u)throw new Error("Start height must be less than or equal to end height.");for(;u>e;){c=u-50,c=BigInt(a))))return s;if(void 0!==i&&i.length>0){let e=0;if(r.microcredits()>i[e]){if(e+=1,s.push(r),"number"==typeof a&&(y+=r.microcredits(),y>=BigInt(a)))return s;if(s.length>=i.length)return s}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+c.toString()+"-"+u.toString()),console.warn("Error: ",e),f+=1,f>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),s}}return s}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,r){try{return await this.fetchData("/blocks?start="+e+"&end="+r)}catch(t){throw new Error("Error fetching blocks between "+e+" and "+r+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof n.BP&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const r=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(r)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return n.BP.fromString(e)}catch(r){try{return n.BP.fromString(await this.getProgram(e))}catch(r){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const r={},t=(e instanceof n.BP?e:await this.getProgramObject(e)).getImports();for(let e=0;e{if(void 0===e)t(new Error("No search parameters provided, cannot retrieve keys"));else{const i=e.cacheKey,a=e.verifyCreditsKeys;if(this.cache.has(i)){const[e,o]=this.cache.get(i),s=n.$7.fromBytes(e),c=n.pF.fromBytes(o);if(a){this.verifyCreditsKeys(i,s,c)||t(new Error(`Cached keys do not match expected keys for ${i}`))}r([s,c])}else t(new Error("Keys not found in cache for "+i))}}))}verifyCreditsKeys(e,r,t){switch(e){case k.bond_public.locator:return r.isBondPublicProver()&&t.isBondPublicVerifier();case k.claim_unbond_public.locator:return r.isClaimUnbondPublicProver()&&t.isClaimUnbondPublicVerifier();case k.fee_private.locator:return r.isFeePrivateProver()&&t.isFeePrivateVerifier();case k.fee_public.locator:return r.isFeePublicProver()&&t.isFeePublicVerifier();case k.inclusion.locator:return r.isInclusionProver()&&t.isInclusionVerifier();case k.join.locator:return r.isJoinProver()&&t.isJoinVerifier();case k.set_validator_state.locator:return r.isSetValidatorStateProver()&&t.isSetValidatorStateVerifier();case k.split.locator:return r.isSplitProver()&&t.isSplitVerifier();case k.transfer_private.locator:return r.isTransferPrivateProver()&&t.isTransferPrivateVerifier();case k.transfer_private_to_public.locator:return r.isTransferPrivateToPublicProver()&&t.isTransferPrivateToPublicVerifier();case k.transfer_public.locator:return r.isTransferPublicProver()&&t.isTransferPublicVerifier();case k.transfer_public_to_private.locator:return r.isTransferPublicToPrivateProver()&&t.isTransferPublicToPrivateVerifier();case k.unbond_public.locator:return r.isUnbondPublicProver()&&t.isUnbondPublicVerifier();default:return!1}}feePrivateKeys(){return this.functionKeys(y.feePrivateKeyParams())}feePublicKeys(){return this.functionKeys(y.feePublicKeyParams())}joinKeys(){return this.functionKeys(y.joinKeyParams())}splitKeys(){return this.functionKeys(y.splitKeyParams())}transferKeys(e){if(S.has(e))return this.functionKeys(y.transferPrivateKeyParams());if(C.has(e))return this.functionKeys(y.transferPrivateToPublicKeyParams());if(B.has(e))return this.functionKeys(y.transferPublicKeyParams());if(R.has(e))return this.functionKeys(y.transferPublicAsSignerKeyParams());if(A.has(e))return this.functionKeys(y.transferPublicToPrivateKeyParams());throw new Error("Invalid visibility type")}async unBondPublicKeys(){return this.functionKeys(y.unbondPublicKeyParams())}insertBondPublicKeys(e){if(!e.isBondPublicProver())throw new Error("Attempted to insert invalid proving keys for bond_public");this.cache.set(k.bond_public.locator,[e.toBytes(),n.pF.bondPublicVerifier().toBytes()])}insertClaimUnbondPublicKeys(e){if(!e.isClaimUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for claim_unbond_public");this.cache.set(k.claim_unbond_public.locator,[e.toBytes(),n.pF.claimUnbondPublicVerifier().toBytes()])}insertFeePrivateKeys(e){if(!e.isFeePrivateProver())throw new Error("Attempted to insert invalid proving keys for fee_private");this.cache.set(k.fee_private.locator,[e.toBytes(),n.pF.feePrivateVerifier().toBytes()])}insertFeePublicKeys(e){if(!e.isFeePublicProver())throw new Error("Attempted to insert invalid proving keys for fee_public");this.cache.set(k.fee_public.locator,[e.toBytes(),n.pF.feePublicVerifier().toBytes()])}insertJoinKeys(e){if(!e.isJoinProver())throw new Error("Attempted to insert invalid proving keys for join");this.cache.set(k.join.locator,[e.toBytes(),n.pF.joinVerifier().toBytes()])}insertSetValidatorStateKeys(e){if(!e.isSetValidatorStateProver())throw new Error("Attempted to insert invalid proving keys for set_validator_state");this.cache.set(k.set_validator_state.locator,[e.toBytes(),n.pF.setValidatorStateVerifier().toBytes()])}insertSplitKeys(e){if(!e.isSplitProver())throw new Error("Attempted to insert invalid proving keys for split");this.cache.set(k.split.locator,[e.toBytes(),n.pF.splitVerifier().toBytes()])}insertTransferPrivateKeys(e){if(!e.isTransferPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_private");this.cache.set(k.transfer_private.locator,[e.toBytes(),n.pF.transferPrivateVerifier().toBytes()])}insertTransferPrivateToPublicKeys(e){if(!e.isTransferPrivateToPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_private_to_public");this.cache.set(k.transfer_private_to_public.locator,[e.toBytes(),n.pF.transferPrivateToPublicVerifier().toBytes()])}insertTransferPublicKeys(e){if(!e.isTransferPublicProver())throw new Error("Attempted to insert invalid proving keys for transfer_public");this.cache.set(k.transfer_public.locator,[e.toBytes(),n.pF.transferPublicVerifier().toBytes()])}insertTransferPublicToPrivateKeys(e){if(!e.isTransferPublicToPrivateProver())throw new Error("Attempted to insert invalid proving keys for transfer_public_to_private");this.cache.set(k.transfer_public_to_private.locator,[e.toBytes(),n.pF.transferPublicToPrivateVerifier().toBytes()])}insertUnbondPublicKeys(e){if(!e.isUnbondPublicProver())throw new Error("Attempted to insert invalid proving keys for unbond_public");this.cache.set(k.unbond_public.locator,[e.toBytes(),n.pF.unbondPublicVerifier().toBytes()])}}class p{account;networkClient;constructor(e,r){this.account=e,this.networkClient=r}setAccount(e){this.account=e}async findCreditsRecords(e,r,t,i){let n=0,a=0;if(i&&("startHeight"in i&&"number"==typeof i.endHeight&&(n=i.startHeight),"endHeight"in i&&"number"==typeof i.endHeight&&(a=i.endHeight)),0==a){const e=await this.networkClient.getLatestHeight();if(e instanceof Error)throw F("Unable to get current block height from the network");a=e}if(n>=a)throw F("Start height must be less than end height");return await this.networkClient.findUnspentRecords(n,a,this.account.privateKey(),e,void 0,t)}async findCreditsRecord(e,r,t,i){const n=await this.findCreditsRecords([e],r,t,i);return!(n instanceof Error)&&n.length>0?n[0]:(console.error("Record not found with error:",n),new Error("Record not found"))}async findRecord(e,r,t){throw new Error("Method not implemented.")}async findRecords(e,r,t){throw new Error("Method not implemented.")}}class v{startHeight;endHeight;constructor(e,r){this.startHeight=e,this.endHeight=r}}let g=null;const b=()=>{if(!g){const e=new Worker(new URL(t.p+t.u(587),t.b),{type:void 0});g=(0,a.LV)(e)}return g};class w{account;keyProvider;host;networkClient;recordProvider;constructor(e,r,t){this.host=e||"https://api.explorer.aleo.org/v1",this.networkClient=new h(this.host),this.keyProvider=r||new f,this.recordProvider=t}setAccount(e){this.account=e}setKeyProvider(e){this.keyProvider=e}setHost(e){this.host=e,this.networkClient.setHost(e)}setRecordProvider(e){this.recordProvider=e}async deploy(e,r,t,i,a,o){try{const r=n.BP.fromString(e);let t;try{t=await this.networkClient.getProgram(r.id())}catch(e){console.log(`Program ${r.id()} does not exist on the network, deploying...`)}if("string"==typeof t)throw`Program ${r.id()} already exists on the network, please rename your program`}catch(e){throw F(`Error validating program: ${e}`)}let s,c=o;if(void 0===o&&void 0!==this.account&&(c=this.account.privateKey()),void 0===c)throw"No private key provided and no private key set in the ProgramManager";try{a=t?await this.getCreditsRecord(r,[],a,i):void 0}catch(e){throw F(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{s=t?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw F(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[u,h]=s;let l;try{l=await this.networkClient.getProgramImports(e)}catch(e){throw F(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}const f=await n.Ao.buildDeploymentTransaction(c,e,r,a,this.host,l,u,h);return await this.networkClient.submitTransaction(f)}async buildExecutionTransaction(e){const{programName:r,functionName:t,fee:i,privateFee:a,inputs:o,recordSearchParams:s,keySearchParams:c,privateKey:u,offlineQuery:h}=e;let l=e.feeRecord,f=e.provingKey,y=e.verifyingKey,d=e.program,p=e.imports;if(void 0===d)try{d=await this.networkClient.getProgram(r)}catch(e){throw F(`Error finding ${r}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`)}else d instanceof n.BP&&(d=d.toString());let v,g=u;if(void 0===u&&void 0!==this.account&&(g=this.account.privateKey()),void 0===g)throw"No private key provided and no private key set in the ProgramManager";try{l=a?await this.getCreditsRecord(i,[],l,s):void 0}catch(e){throw F(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{v=a?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys()}catch(e){throw F(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[b,w]=v;if(!f||!y)try{[f,y]=await this.keyProvider.functionKeys(c)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}if(n.BP.fromString(d).getImports().length>0&&!p)try{p=await this.networkClient.getProgramImports(r)}catch(e){throw F(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await n.Ao.buildExecutionTransaction(g,d,t,o,i,l,this.host,p,f,y,b,w,h)}async execute(e){const r=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(r)}async run(e,r,t,i,a,o,s,c,u,h){let l=u;if(void 0===u&&void 0!==this.account&&(l=this.account.privateKey()),void 0===l)throw"No private key provided and no private key set in the ProgramManager";if(!s||!c)try{[s,c]=await this.keyProvider.functionKeys(o)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",s),console.log("Verifying key: ",c),n.Ao.executeFunctionOffline(l,e,r,t,i,!1,a,s,c,this.host,h)}async join(e,r,t,i,a,o,s,c){let u,h,l=s;if(void 0===s&&void 0!==this.account&&(l=this.account.privateKey()),void 0===l)throw"No private key provided and no private key set in the ProgramManager";try{u=i?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),h=await this.keyProvider.joinKeys()}catch(e){throw F(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[f,y]=u,[d,p]=h;try{o=i?await this.getCreditsRecord(t,[],o,a):void 0}catch(e){throw F(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof n.ZF?e:n.ZF.fromString(e),r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw F("Records provided are not valid. Please ensure they are valid plaintext records.")}const v=await n.Ao.buildJoinTransaction(l,e,r,t,o,this.host,d,p,f,y,c);return await this.networkClient.submitTransaction(v)}async split(e,r,t,i){let a,o=t;if(void 0===o&&void 0!==this.account&&(o=this.account.privateKey()),void 0===o)throw"No private key provided and no private key set in the ProgramManager";try{a=await this.keyProvider.splitKeys()}catch(e){throw F(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[s,c]=a;try{r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw F("Record provided is not valid. Please ensure it is a valid plaintext record.")}const u=await n.Ao.buildSplitTransaction(o,e,r,this.host,s,c,i);return await this.networkClient.submitTransaction(u)}async synthesizeKeys(e,r,t,i){let a,o=i;void 0===o&&(o=void 0!==this.account?this.account.privateKey():new n.ZD);try{a=await this.networkClient.getProgramImports(e);const i=await n.Ao.synthesizeKeyPair(o,e,r,t,a);return[i.provingKey(),i.verifyingKey()]}catch(e){throw F(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,r,t,i,a,o,s,c,u,h){t=P(t);let l,f,y=u;if(void 0===y&&void 0!==this.account&&(y=this.account.privateKey()),void 0===y)throw"No private key provided and no private key set in the ProgramManager";try{l=a?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),f=await this.keyProvider.transferKeys(t)}catch(e){throw F(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[d,p]=l,[v,g]=f;try{const e=[];m(t)?(s=await this.getCreditsRecord(i,[],s,o),e.push(s.nonce())):s=void 0,c=a?await this.getCreditsRecord(i,e,c,o):void 0}catch(e){throw F(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await n.Ao.buildTransferTransaction(y,e,r,t,s,i,c,this.host,v,g,d,p,h)}async buildTransferPublicTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async buildTransferPublicAsSignerTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async transfer(e,r,t,i,n,a,o,s,c,u){const h=await this.buildTransferTransaction(e,r,t,i,n,a,o,s,c,u);return await this.networkClient.submitTransaction(h)}async buildBondPublicTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*i),{programName:o="credits.aleo",functionName:s="bond_public",fee:c=n.fee||.86,privateFee:u=!1,inputs:h=[e,r,t,`${a.toString()}u64`],keySearchParams:f=new l({proverUri:k.bond_public.prover,verifierUri:k.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:y=this.creditsProgram(),...d}=n,p={programName:o,functionName:s,fee:c,privateFee:u,inputs:h,keySearchParams:f,...d};return await this.buildExecutionTransaction(p)}async bondPublic(e,r,t,i,n={}){const a=await this.buildBondPublicTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildBondValidatorTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*t),o=Math.trunc(i),{programName:s="credits.aleo",functionName:c="bond_validator",fee:u=n.fee||.86,privateFee:h=!1,inputs:f=[e,r,`${a.toString()}u64`,`${o.toString()}u8`],keySearchParams:y=new l({proverUri:k.bond_validator.prover,verifierUri:k.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:d=this.creditsProgram(),...p}=n,v={programName:s,functionName:c,fee:u,privateFee:h,inputs:f,keySearchParams:y,...p};return await this.buildExecutionTransaction(v)}async bondValidator(e,r,t,i,n={}){const a=await this.buildBondValidatorTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildUnbondPublicTransaction(e,r,t={}){const i=Math.trunc(1e6*r),{programName:n="credits.aleo",functionName:a="unbond_public",fee:o=t.fee||1.3,privateFee:s=!1,inputs:c=[e,`${i.toString()}u64`],keySearchParams:u=new l({proverUri:k.unbond_public.prover,verifierUri:k.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:h=this.creditsProgram(),...f}=t,y={programName:n,functionName:a,fee:o,privateFee:s,inputs:c,keySearchParams:u,...f};return this.buildExecutionTransaction(y)}async unbondPublic(e,r,t={}){const i=await this.buildUnbondPublicTransaction(e,r,t);return await this.networkClient.submitTransaction(i)}async buildClaimUnbondPublicTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="claim_unbond_public",fee:n=r.fee||2,privateFee:a=!1,inputs:o=[e],keySearchParams:s=new l({proverUri:k.claim_unbond_public.prover,verifierUri:k.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:c=this.creditsProgram(),...u}=r,h={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...u};return await this.buildExecutionTransaction(h)}async claimUnbondPublic(e,r={}){const t=await this.buildClaimUnbondPublicTransaction(e,r);return await this.networkClient.submitTransaction(t)}async buildSetValidatorStateTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="set_validator_state",fee:n=1,privateFee:a=!1,inputs:o=[e.toString()],keySearchParams:s=new l({proverUri:k.set_validator_state.prover,verifierUri:k.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...c}=r,u={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...c};return await this.execute(u)}async setValidatorState(e,r={}){const t=await this.buildSetValidatorStateTransaction(e,r);return this.networkClient.submitTransaction(t)}verifyExecution(e){try{const r=e.getExecution(),t=e.getFunctionId(),i=e.getProgram(),a=e.getVerifyingKey();return(0,n.Yc)(r,a,i,t)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return n.BP.fromString(e)}creditsProgram(){return n.BP.getCreditsProgram()}verifyProgram(e){try{return n.BP.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,r,t,i){try{return t instanceof n.ZF?t:n.ZF.fromString(t)}catch(t){try{const t=this.recordProvider;return await t.findCreditsRecord(e,!0,r,i)}catch(e){throw F(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function m(e){return E.has(e)}function P(e){return T.has(e)?e:F(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const _=n.OS.baseUrl();function K(e){const r=n.pF[e.verifyingKey];if(!r)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:r}}const k={bond_public:K(n.OS.bond_public()),bond_validator:K(n.OS.bond_validator()),claim_unbond_public:K(n.OS.claim_unbond_public()),fee_private:K(n.OS.fee_private()),fee_public:K(n.OS.fee_public()),inclusion:K(n.OS.inclusion()),join:K(n.OS.join()),set_validator_state:K(n.OS.set_validator_state()),split:K(n.OS.split()),transfer_private:K(n.OS.transfer_private()),transfer_private_to_public:K(n.OS.transfer_private_to_public()),transfer_public:K(n.OS.transfer_public()),transfer_public_as_signer:K(n.OS.transfer_public_as_signer()),transfer_public_to_private:K(n.OS.transfer_public_to_private()),unbond_public:K(n.OS.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},E=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),T=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),S=new Set(["private","transfer_private","transferPrivate"]),C=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),B=new Set(["public","transfer_public","transferPublic"]),R=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),A=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function F(e){throw console.error(e),e}async function V(){console.warn("initializeWasm is deprecated, you no longer need to use it")}i()}catch(U){i(U)}}))}}]); +//# sourceMappingURL=876.bundle.js.map \ No newline at end of file diff --git a/820.bundle.js.LICENSE.txt b/876.bundle.js.LICENSE.txt similarity index 100% rename from 820.bundle.js.LICENSE.txt rename to 876.bundle.js.LICENSE.txt diff --git a/876.bundle.js.map b/876.bundle.js.map new file mode 100644 index 000000000..20b156d66 --- /dev/null +++ b/876.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"876.bundle.js","mappings":";mHAKA,MAAMA,EAAcC,OAAO,iBACrBC,EAAiBD,OAAO,oBACxBE,EAAeF,OAAO,wBACtBG,EAAYH,OAAO,qBACnBI,EAAcJ,OAAO,kBACrBK,EAAYC,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEC,EAAmB,IAAIC,IAAI,CAC7B,CAAC,QA7CwB,CACzBC,UAAYH,GAAQD,EAASC,IAAQA,EAAIP,GACzC,SAAAW,CAAUC,GACN,MAAM,MAAEC,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAC,EAAOJ,EAAKC,GACL,CAACC,EAAO,CAACA,GACpB,EACAG,YAAYC,IACRA,EAAKC,QACEC,EAAKF,MAqChB,CAAC,QA/BwB,CACzBR,UAAYW,GAAUf,EAASe,IAAUhB,KAAegB,EACxD,SAAAV,EAAU,MAAEU,IACR,IAAIC,EAcJ,OAZIA,EADAD,aAAiBE,MACJ,CACTC,SAAS,EACTH,MAAO,CACHI,QAASJ,EAAMI,QACfC,KAAML,EAAMK,KACZC,MAAON,EAAMM,QAKR,CAAEH,SAAS,EAAOH,SAE5B,CAACC,EAAY,GACxB,EACA,WAAAL,CAAYK,GACR,GAAIA,EAAWE,QACX,MAAMI,OAAOC,OAAO,IAAIN,MAAMD,EAAWD,MAAMI,SAAUH,EAAWD,OAExE,MAAMC,EAAWD,KACrB,MAoBJ,SAASL,EAAOJ,EAAKkB,EAAKC,WAAYC,EAAiB,CAAC,MACpDF,EAAGG,iBAAiB,WAAW,SAASC,EAASC,GAC7C,IAAKA,IAAOA,EAAGC,KACX,OAEJ,IAhBR,SAAyBJ,EAAgBK,GACrC,IAAK,MAAMC,KAAiBN,EAAgB,CACxC,GAAIK,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBT,EAAgBG,EAAGE,QAEpC,YADAK,QAAQC,KAAK,mBAAmBR,EAAGE,6BAGvC,MAAM,GAAEO,EAAE,KAAEC,EAAI,KAAEC,GAASlB,OAAOC,OAAO,CAAEiB,KAAM,IAAMX,EAAGC,MACpDW,GAAgBZ,EAAGC,KAAKW,cAAgB,IAAIC,IAAIC,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASL,EAAKM,MAAM,GAAI,GAAGC,QAAO,CAACzC,EAAK0C,IAAS1C,EAAI0C,IAAO1C,GAC5D2C,EAAWT,EAAKO,QAAO,CAACzC,EAAK0C,IAAS1C,EAAI0C,IAAO1C,GACvD,OAAQiC,GACJ,IAAK,MAEGK,EAAcK,EAElB,MACJ,IAAK,MAEGJ,EAAOL,EAAKM,OAAO,GAAG,IAAMH,EAAcd,EAAGC,KAAKf,OAClD6B,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcK,EAASC,MAAML,EAAQJ,GAEzC,MACJ,IAAK,YAGGG,EA6KxB,SAAetC,GACX,OAAOgB,OAAOC,OAAOjB,EAAK,CAAE,CAACZ,IAAc,GAC/C,CA/KsCyD,CADA,IAAIF,KAAYR,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAElC,EAAK,MAAEC,GAAU,IAAIC,eAC7BC,EAAOJ,EAAKE,GACZoC,EAkKxB,SAAkBtC,EAAK8C,GAEnB,OADAC,EAAcC,IAAIhD,EAAK8C,GAChB9C,CACX,CArKsCiD,CAAShD,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGqC,OAAcY,EAElB,MACJ,QACI,OAEZ,CACA,MAAOzC,GACH6B,EAAc,CAAE7B,QAAO,CAAChB,GAAc,EAC1C,CACA0D,QAAQC,QAAQd,GACXe,OAAO5C,IACD,CAAEA,QAAO,CAAChB,GAAc,MAE9B6D,MAAMhB,IACP,MAAOiB,EAAWC,GAAiBC,EAAYnB,GAC/CpB,EAAGwC,YAAY1C,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGsC,GAAY,CAAEvB,OAAOwB,GACvD,YAATvB,IAEAf,EAAGyC,oBAAoB,UAAWrC,GAClCsC,EAAc1C,GACV1B,KAAaQ,GAAiC,mBAAnBA,EAAIR,IAC/BQ,EAAIR,KAEZ,IAEC6D,OAAOQ,IAER,MAAON,EAAWC,GAAiBC,EAAY,CAC3ChD,MAAO,IAAIqD,UAAU,+BACrB,CAACrE,GAAc,IAEnByB,EAAGwC,YAAY1C,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGsC,GAAY,CAAEvB,OAAOwB,EAAc,GAE1F,IACItC,EAAGX,OACHW,EAAGX,OAEX,CAIA,SAASqD,EAAcG,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAASC,YAAYlD,IAChC,EAEQmD,CAAcF,IACdA,EAASG,OACjB,CACA,SAAS1D,EAAKU,EAAIiD,GACd,OAAOC,EAAYlD,EAAI,GAAIiD,EAC/B,CACA,SAASE,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAI3D,MAAM,6CAExB,CACA,SAAS4D,EAAgBrD,GACrB,OAAOsD,EAAuBtD,EAAI,CAC9Be,KAAM,YACPqB,MAAK,KACJM,EAAc1C,EAAG,GAEzB,CACA,MAAMuD,EAAe,IAAIC,QACnBC,EAAkB,yBAA0BxD,YAC9C,IAAIyD,sBAAsB1D,IACtB,MAAM2D,GAAYJ,EAAaK,IAAI5D,IAAO,GAAK,EAC/CuD,EAAazB,IAAI9B,EAAI2D,GACJ,IAAbA,GACAN,EAAgBrD,EACpB,IAcR,SAASkD,EAAYlD,EAAIgB,EAAO,GAAIiC,EAAS,WAAc,GACvD,IAAIY,GAAkB,EACtB,MAAMlC,EAAQ,IAAImC,MAAMb,EAAQ,CAC5B,GAAAW,CAAIG,EAASvC,GAET,GADA2B,EAAqBU,GACjBrC,IAASnD,EACT,MAAO,MAXvB,SAAyBsD,GACjB8B,GACAA,EAAgBO,WAAWrC,EAEnC,CAQoBsC,CAAgBtC,GAChB0B,EAAgBrD,GAChB6D,GAAkB,CAAI,EAG9B,GAAa,SAATrC,EAAiB,CACjB,GAAoB,IAAhBR,EAAKkD,OACL,MAAO,CAAE9B,KAAM,IAAMT,GAEzB,MAAMwC,EAAIb,EAAuBtD,EAAI,CACjCe,KAAM,MACNC,KAAMA,EAAKE,KAAKkD,GAAMA,EAAEC,eACzBjC,KAAKjB,GACR,OAAOgD,EAAE/B,KAAKkC,KAAKH,EACvB,CACA,OAAOjB,EAAYlD,EAAI,IAAIgB,EAAMQ,GACrC,EACA,GAAAM,CAAIiC,EAASvC,EAAMC,GACf0B,EAAqBU,GAGrB,MAAOtE,EAAO+C,GAAiBC,EAAYd,GAC3C,OAAO6B,EAAuBtD,EAAI,CAC9Be,KAAM,MACNC,KAAM,IAAIA,EAAMQ,GAAMN,KAAKkD,GAAMA,EAAEC,aACnC9E,SACD+C,GAAeF,KAAKjB,EAC3B,EACA,KAAAO,CAAMqC,EAASQ,EAAUC,GACrBrB,EAAqBU,GACrB,MAAMY,EAAOzD,EAAKA,EAAKkD,OAAS,GAChC,GAAIO,IAASrG,EACT,OAAOkF,EAAuBtD,EAAI,CAC9Be,KAAM,aACPqB,KAAKjB,GAGZ,GAAa,SAATsD,EACA,OAAOvB,EAAYlD,EAAIgB,EAAKM,MAAM,GAAI,IAE1C,MAAOL,EAAcqB,GAAiBoC,EAAiBF,GACvD,OAAOlB,EAAuBtD,EAAI,CAC9Be,KAAM,QACNC,KAAMA,EAAKE,KAAKkD,GAAMA,EAAEC,aACxBpD,gBACDqB,GAAeF,KAAKjB,EAC3B,EACA,SAAAwD,CAAUZ,EAASS,GACfrB,EAAqBU,GACrB,MAAO5C,EAAcqB,GAAiBoC,EAAiBF,GACvD,OAAOlB,EAAuBtD,EAAI,CAC9Be,KAAM,YACNC,KAAMA,EAAKE,KAAKkD,GAAMA,EAAEC,aACxBpD,gBACDqB,GAAeF,KAAKjB,EAC3B,IAGJ,OA7EJ,SAAuBQ,EAAO3B,GAC1B,MAAM2D,GAAYJ,EAAaK,IAAI5D,IAAO,GAAK,EAC/CuD,EAAazB,IAAI9B,EAAI2D,GACjBF,GACAA,EAAgBmB,SAASjD,EAAO3B,EAAI2B,EAE5C,CAsEIkD,CAAclD,EAAO3B,GACd2B,CACX,CAIA,SAAS+C,EAAiBzD,GACtB,MAAM6D,EAAY7D,EAAaC,IAAIqB,GACnC,MAAO,CAACuC,EAAU5D,KAAK6D,GAAMA,EAAE,MALnBC,EAK+BF,EAAU5D,KAAK6D,GAAMA,EAAE,KAJ3DE,MAAMC,UAAUC,OAAOzD,MAAM,GAAIsD,KAD5C,IAAgBA,CAMhB,CACA,MAAMnD,EAAgB,IAAI2B,QAe1B,SAASjB,EAAYhD,GACjB,IAAK,MAAOK,EAAMwF,KAAY1G,EAC1B,GAAI0G,EAAQxG,UAAUW,GAAQ,CAC1B,MAAO8F,EAAiB/C,GAAiB8C,EAAQvG,UAAUU,GAC3D,MAAO,CACH,CACIwB,KAAM,UACNnB,OACAL,MAAO8F,GAEX/C,EAER,CAEJ,MAAO,CACH,CACIvB,KAAM,MACNxB,SAEJsC,EAAc+B,IAAIrE,IAAU,GAEpC,CACA,SAAS4B,EAAc5B,GACnB,OAAQA,EAAMwB,MACV,IAAK,UACD,OAAOrC,EAAiBkF,IAAIrE,EAAMK,MAAMT,YAAYI,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAAS+D,EAAuBtD,EAAIsF,EAAK1D,GACrC,OAAO,IAAIK,SAASC,IAChB,MAAMpB,EAeH,IAAImE,MAAM,GACZM,KAAK,GACLrE,KAAI,IAAMsE,KAAKC,MAAMD,KAAKE,SAAWC,OAAOC,kBAAkBvB,SAAS,MACvEwB,KAAK,KAjBN7F,EAAGG,iBAAiB,WAAW,SAAS2F,EAAEzF,GACjCA,EAAGC,MAASD,EAAGC,KAAKQ,IAAMT,EAAGC,KAAKQ,KAAOA,IAG9Cd,EAAGyC,oBAAoB,UAAWqD,GAClC5D,EAAQ7B,EAAGC,MACf,IACIN,EAAGX,OACHW,EAAGX,QAEPW,EAAGwC,YAAY1C,OAAOC,OAAO,CAAEe,MAAMwE,GAAM1D,EAAU,GAE7D,whCCrSamE,EACXC,YACAC,SACAC,SAEApD,WAAAA,CAAYqD,EAAuB,CAAC,GAClC,IACEC,KAAKJ,YAAcI,KAAKC,qBAAqBF,EAC9C,CAAC,MAAOG,GAEP,MADA1F,QAAQ+B,MAAM,kBAAmB2D,GAC3B,IAAI7G,MAAM,kBACjB,CACD2G,KAAKH,SAAWM,EAAAA,GAAQC,iBAAiBJ,KAAKJ,aAC9CI,KAAKF,SAAWO,EAAAA,GAAQD,iBAAiBJ,KAAKJ,aAazC,qBAAOU,CAAeC,EAA2CC,GACtE,IACED,EAAoC,iBAAfA,EAA2BE,EAAAA,GAAqBC,WAAWH,GAAcA,EAC9F,MAAMX,EAAce,EAAAA,GAAWC,yBAAyBL,EAAYC,GACpE,OAAO,IAAIb,EAAQ,CAAEkB,WAAYjB,EAAYkB,aAC9C,CAAC,MAAMZ,GACN,MAAM,IAAI7G,MAAM,uCACjB,EAGK4G,oBAAAA,CAAqBF,GAC3B,OAAIA,EAAOgB,KACFJ,EAAAA,GAAWK,oBAAoBjB,EAAOgB,MAE3ChB,EAAOc,WACFF,EAAAA,GAAWM,YAAYlB,EAAOc,YAEhC,IAAIF,EAAAA,GAGbE,UAAAA,GACE,OAAOb,KAAKJ,YAGdsB,OAAAA,GACE,OAAOlB,KAAKH,SAGdsB,OAAAA,GACE,OAAOnB,KAAKF,SAGd7B,QAAAA,GACE,OAAO+B,KAAKmB,UAAUL,YAYxBM,cAAAA,CAAeZ,GACb,OAAOR,KAAKJ,YAAYyB,aAAab,GAYvCc,aAAAA,CAAcf,GACZ,OAAOP,KAAKH,SAAS0B,QAAQhB,GAY/BiB,cAAAA,CAAeC,GACb,OAAOA,EAAY3G,KAAKyF,GAAeP,KAAKH,SAAS0B,QAAQhB,KAyB/DmB,oBAAAA,CAAqBnB,GACnB,GAA0B,iBAAfA,EAUT,OAAOA,EAAWoB,QAAQ3B,KAAKH,UAT/B,IAEE,OADyB+B,EAAAA,GAAiBlB,WAAWH,GAC7BoB,QAAQ3B,KAAKH,SACtC,CACD,MAAOK,GACL,OAAO,CACR,EAmBL2B,IAAAA,CAAKtI,GACH,OAAOyG,KAAKJ,YAAYiC,KAAKtI,GAgB/BuI,MAAAA,CAAOvI,EAAqBwI,GAC1B,OAAO/B,KAAKF,SAASgC,OAAOvI,EAASwI,ICnNlCC,eAAexE,EAAIyE,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIhJ,MAAM8I,EAASG,OAAS,sBAAwBL,GAG9D,OAAOE,CACX,CAGOH,eAAeO,EAAKN,EAAmBC,GAC1CA,EAAQM,OAAS,OAEjB,MAAML,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIhJ,MAAM8I,EAASG,OAAS,uBAAyBL,GAG/D,OAAOE,CACX,CCUA,MAAMM,EACJC,KACAC,QACAC,QAEAlG,WAAAA,CAAYgG,EAAcR,GACxBlC,KAAK0C,KAAOA,EAAO,WAEfR,GAAWA,EAAQS,QACrB3C,KAAK2C,QAAUT,EAAQS,QAGvB3C,KAAK2C,QAAU,CAEb,qBAAsB,UAa5BE,UAAAA,CAAWD,GACT5C,KAAK4C,QAAUA,EASjBE,UAAAA,GACE,OAAO9C,KAAK4C,QASdG,OAAAA,CAAQL,GACN1C,KAAK0C,KAAOA,EAAO,WAGrB,eAAMM,CACFf,EAAM,KAER,IACA,MAAME,QAAiB3E,EAAIwC,KAAK0C,KAAOT,EAAK,CAC1CU,QAAS3C,KAAK2C,UAGhB,aAAaR,EAASc,MACrB,CAAC,MAAO1G,GACP,MAAM,IAAIlD,MAAM,uBACjB,EA0BH,wBAAM6J,CACFC,EACAC,EACAvC,EACAwC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfJ,EAAc,EAChB,MAAM,IAAI9J,MAAM,mDAIlB,MAAMmK,EAAU,IAAI3E,MACpB,IAAI5F,EACAwK,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfjD,EAA4B,CACrC,QAA4B,IAAjBb,KAAK4C,QACd,MAAM,IAAIvJ,MAAM,oGAEhBqK,EAAqB1D,KAAK4C,QAAQhD,WAErC,MACC,IACE8D,EAAqB7C,aAAsBF,EAAAA,GAAaE,EAAaF,EAAAA,GAAWM,YAAYJ,EAC7F,CAAC,MAAOtE,GACP,MAAM,IAAIlD,MAAM,sCACjB,CAEH,MAAM6H,EAAUwC,EAAmBK,cAGnC,IACE,MAAMC,QAAoBhE,KAAKiE,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAI3K,MAAM,uCAFhBsK,EAAeK,CAIlB,CAAC,MAAOzH,GACP,MAAM,IAAIlD,MAAM,sCACjB,CAUD,GANEoK,EADuB,iBAAdL,GAA0BA,GAAaO,EAC1CP,EAEAO,EAIJR,EAAcM,EAChB,MAAM,IAAIpK,MAAM,0DAIlB,KAAOoK,EAAMN,GAAa,CACxBlK,EAAQwK,EAAM,GACVxK,EAAQkK,IACVlK,EAAQkK,GAEV,IAEE,MAAMe,QAAelE,KAAKmE,cAAclL,EAAOwK,GAE/C,GADAA,EAAMxK,IACAiL,aAAkB7K,OAEtB,IAAK,IAAI+K,EAAI,EAAGA,EAAIF,EAAOpG,OAAQsG,IAAK,CACtC,MACMC,EADQH,EAAOE,GACMC,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAavG,OAAQwG,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqB5J,KAAmB,CAC1C,MAAM6J,EAAcD,EAAqBC,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAY5G,OAAQ6G,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIpF,EAAI,EAAGA,EAAIkF,EAAWE,QAAQhH,OAAQ4B,IAAK,CAClD,MAAMqF,EAASH,EAAWE,QAAQpF,GAClC,GAAoB,WAAhBqF,EAAOpK,KACT,IAEE,MAAMqK,EAASpD,EAAAA,GAAiBlB,WAAWqE,EAAO5L,OAElD,GAAI6L,EAAOrD,QAAQT,GAAU,CAE3B,MAAM+D,EAAkBD,EAAOzD,QAAQL,GAGjCgE,EAAQD,EAAgBC,QAC9B,GAAI3B,EAAO4B,SAASD,GAClB,SAIF,MAAME,EAAeH,EAAgBI,mBAAmB3B,EAAoB,eAAgB,WAE5F,UACQ1D,KAAKsF,gBAAgBF,EAC5B,CAAC,MAAO7I,GAEP,IAAK8G,IACHG,EAAQ+B,KAAKN,GAEkB,iBAApB3B,IACTO,GAAoBoB,EAAgBO,eAEhC3B,GAAoBC,OAAOR,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQvF,OAAS,EAAG,CAC3D,IAAI2H,EAAgB,EACpB,GAAIR,EAAgBO,eAAiBnC,EAAQoC,GAAgB,CAIzD,GAHAA,GAAiB,EACjBjC,EAAQ+B,KAAKN,GAEkB,iBAApB3B,IACTO,GAAoBoB,EAAgBO,eAEhC3B,GAAoBC,OAAOR,IAC7B,OAAOE,EAGX,GAAIA,EAAQ1F,QAAUuF,EAAQvF,OAC5B,OAAO0F,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAOjH,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHA/B,QAAQC,KAAK,mCAAqCxB,EAAMgF,WAAa,IAAMwF,EAAIxF,YAC/EzD,QAAQC,KAAK,UAAW8B,GACxBqH,GAAY,EACRA,EAAW,GAEb,OADApJ,QAAQC,KAAK,0EACN+I,CAEV,CACF,CACD,OAAOA,EAUT,cAAMkC,CAASC,GACb,IAEE,aADoB3F,KAAKgD,UAAiB,UAAY2C,EAEvD,CAAC,MAAOpJ,GACP,MAAM,IAAIlD,MAAM,wBACjB,EAWH,mBAAM8K,CAAclL,EAAewK,GACjC,IACE,aAAazD,KAAKgD,UAAwB,iBAAmB/J,EAAQ,QAAUwK,EAChF,CAAC,MAAOlH,GAEP,MAAM,IAAIlD,MADW,iCAAmCJ,EAAQ,QAAUwK,EAAM,IAEjF,EASH,0CAAMmC,CAAqCf,GACrCA,aAAmBgB,EAAAA,KACrBhB,EAAUA,EAAQ5G,YAEpB,IAEE,aADiB+B,KAAKgD,UAAkB,kCAAoC6B,IAClEiB,QAAQ,IAAM,GACzB,CAAC,MAAOvJ,GACP,MAAM,IAAIlD,MAAM,qDACjB,EASH,wCAAM0M,CAAmClB,GACvC,IACE,MAAMmB,QAA+BhG,KAAK4F,qCAAqCf,GAC/E,aAA+B7E,KAAKiG,eAAeD,EACpD,CAAC,MAAOzJ,GACP,MAAM,IAAIlD,MAAM,qDACjB,EASH,oBAAM6M,GACJ,IACE,aAAalG,KAAKgD,UAAiB,gBACpC,CAAC,MAAOzG,GACP,MAAM,IAAIlD,MAAM,+BACjB,EAQH,wBAAM8M,GACJ,IACE,aAAanG,KAAKgD,UAAkB,oBACrC,CAAC,MAAOzG,GACP,MAAM,IAAIlD,MAAM,+BACjB,EASH,qBAAM4K,GACJ,IACE,aAAajE,KAAKgD,UAAkB,iBACrC,CAAC,MAAOzG,GACP,MAAM,IAAIlD,MAAM,gCACjB,EAcH,gBAAM+M,CAAWC,GACf,IACE,aAAarG,KAAKgD,UAAkB,YAAcqD,EACnD,CAAC,MAAO9J,GACP,MAAM,IAAIlD,MAAM,yBACjB,EAoBH,sBAAMiN,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQnF,WAAW6F,EAC3B,CAAC,MAAOhK,GACP,IACE,OAAOsJ,EAAAA,GAAQnF,iBAA0BV,KAAKoG,WAAWG,GAC1D,CAAC,MAAOhK,GACP,MAAM,IAAIlD,MAAM,GAAGkN,iDACpB,CACF,EA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+BvG,KAAKsG,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAIvC,EAAI,EAAGA,EAAIsC,EAAW5I,OAAQsG,IAAK,CAC1C,MAAMwC,EAAYF,EAAWtC,GAC7B,IAAKqC,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8B9G,KAAKoG,WAAWQ,GAC9CG,QAAsC/G,KAAKwG,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAOlK,GACP,MAAM0K,EAAY,mCAAqC1K,EACxD,EAcH,2BAAM2K,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+BvG,KAAKsG,iBAAiBC,IACxFI,YAChB,CAAC,MAAOpK,GACP,MAAM,IAAIlD,MAAM,8CAAgDkD,EACjE,EAYH,4BAAM4K,CAAuBd,GAC3B,IACE,aAAarG,KAAKgD,UAAyB,YAAcqD,EAAY,YACtE,CAAC,MAAO9J,GACP,MAAM,IAAIlD,MAAM,2FACjB,EAiBH,4BAAM+N,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAahH,KAAKgD,UAAkB,YAAcqD,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAOzK,GACP,MAAM,IAAIlD,MAAM,kFACjB,EASH,kBAAMiO,GACJ,IACE,aAAatH,KAAKgD,UAAkB,oBACrC,CAAC,MAAOzG,GACP,MAAM,IAAIlD,MAAM,iCACjB,EAUH,oBAAM4M,CAAevL,GACnB,IACA,aAAasF,KAAKgD,UAA4B,gBAAkBtI,EAC/D,CAAC,MAAO6B,GACP,MAAM,IAAIlD,MAAM,8BACjB,EAUH,qBAAMkO,CAAgB5B,GACpB,IACA,aAAa3F,KAAKgD,UAAmC,UAAY2C,EAAO1H,WAAa,gBACpF,CAAC,MAAO1B,GACP,MAAM,IAAIlD,MAAM,+BACjB,EASH,8BAAMmO,GACJ,IACE,aAAaxH,KAAKgD,UAAmC,2BACtD,CAAC,MAAOzG,GACP,MAAM,IAAIlD,MAAM,4CACjB,EAUH,qBAAMiM,CAAgBmC,GACpB,IACE,aAAazH,KAAKgD,UAAkB,sBAAwByE,EAC7D,CAAC,MAAOlL,GACP,MAAM,IAAIlD,MAAM,gCACjB,EASH,uBAAMqO,CAAkBlD,GACtB,MAAMmD,EAAqBnD,aAAuBoD,EAAAA,GAAcpD,EAAYvG,WAAauG,EACzF,IACE,MAAMrC,QAAiBI,EAAKvC,KAAK0C,KAAO,yBAA0B,CAChEmF,KAAMF,EACNhF,QAASjJ,OAAOC,OAAO,CAAC,EAAGqG,KAAK2C,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaR,EAASc,MAEvB,CAAC,MAAO1G,GACP,MAAM,IAAIlD,MAAM,qDAAsDkD,EAAgBhD,UACvF,CACF,CAAC,MAAOgD,GACP,MAAM,IAAIlD,MAAM,oDAAqDkD,EAAgBhD,UACtF,GCjnBL,MAAMuO,EACFtO,KACAuO,UACAC,YACAC,SAUAvL,WAAAA,CAAYqD,GACRC,KAAK+H,UAAYhI,EAAOgI,UACxB/H,KAAKgI,YAAcjI,EAAOiI,YAC1BhI,KAAKiI,SAAWlI,EAAOkI,SACvBjI,KAAKxG,KAAOuG,EAAOvG,MAyK3B,MAAM0O,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFrG,EAAM,KAEN,IACA,MAAME,QAAiB3E,EAAIyE,GACrB/H,QAAaiI,EAASoG,cAC5B,OAAO,IAAIC,WAAWtO,EACrB,CAAC,MAAOqC,GACL,MAAM,IAAIlD,MAAM,uBAAyBkD,EAC5C,EAGLG,WAAAA,GACIsD,KAAKqI,QAAUI,EACfzI,KAAKmI,MAAQ,IAAI5P,IACjByH,KAAKoI,aAAc,EAQvBM,QAAAA,CAASA,GACL1I,KAAKoI,YAAcM,EAMvBC,UAAAA,GACI3I,KAAKmI,MAAMS,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC/I,KAAKmI,MAAMzM,IAAIoN,EAAO,CAACE,EAAWE,UAAWD,EAAaC,YAS9DC,YAAAA,CAAaL,GACT,OAAO9I,KAAKmI,MAAMiB,IAAIN,GAS1BO,UAAAA,CAAWP,GACP,OAAO9I,KAAKmI,MAAMmB,OAAOR,GAS7BS,OAAAA,CAAQT,GAEJ,GADAtO,QAAQgP,MAAM,2CAA2CV,KACrD9I,KAAKmI,MAAMiB,IAAIN,GAAQ,CACvB,MAAOW,EAAiBC,GAAoC1J,KAAKmI,MAAM3K,IAAIsL,GAC3E,MAAO,CAACa,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAIrQ,MAAM,2BAwBzB,kBAAMyQ,CAAa/J,GACf,GAAIA,EAAQ,CACR,IAAIgK,EACAC,EACA/B,EACJ,GAAI,SAAUlI,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIiH,EAAMiD,EAAqBC,OAAOnK,EAAa,MACnD,KAAMiH,aAAe3N,OACjB,OAAO2G,KAAKmK,iBAAiBnD,EAEpC,CAcD,GAZI,cAAejH,GAAwC,iBAAvBA,EAAkB,YAClDgK,EAAYhK,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtDiK,EAAcjK,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDkI,EAAWlI,EAAiB,UAG5BgK,GAAaC,EACb,aAAahK,KAAKoK,gBAAgBL,EAAWC,EAAa/B,GAG9D,GAAIA,EACA,OAAOjI,KAAKuJ,QAAQtB,EAE3B,CACD,MAAM5O,MAAM,oGA4BhB,qBAAM+Q,CAAgBL,EAAmBC,EAAqB/B,GAC1D,IAEI,GAAIjI,KAAKoI,YAAa,CACbH,IACDA,EAAW8B,GAEf,MAAM5Q,EAAQ6G,KAAKmI,MAAM3K,IAAIyK,GAC7B,QAAqB,IAAV9O,EACP,MAAO,CAACwQ,EAAAA,GAAWC,UAAUzQ,EAAM,IAAK0Q,EAAAA,GAAaD,UAAUzQ,EAAM,KAClE,CACHqB,QAAQgP,MAAM,kCAAoCO,GAClD,MAAMf,EAAyBW,EAAAA,GAAWC,gBAAgB5J,KAAKsI,WAAWyB,IAC1EvP,QAAQgP,MAAM,2BAA6BQ,GAC3C,MAAMf,QAAoCjJ,KAAKqK,gBAAgBL,GAE/D,OADAhK,KAAKmI,MAAMzM,IAAIuM,EAAU,CAACe,EAAWE,UAAWD,EAAaC,YACtD,CAACF,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBW,EAAAA,GAAWC,gBAAgB5J,KAAKsI,WAAWyB,IAE1E,MAAO,CAACf,QADkChJ,KAAKqK,gBAAgBL,GAElE,CACJ,CAAC,MAAOzN,GACL,MAAM,IAAIlD,MAAM,UAAUkD,kDAAsDwN,SAAiBC,KACpG,EAWL,qBAAMM,CAAgBP,EAAmB9B,GACrC,IAEI,GAAIjI,KAAKoI,YAAa,CACbH,IACDA,EAAW8B,GAEf,MAAM5Q,EAAQ6G,KAAKmI,MAAM3K,IAAIyK,GAC7B,QAAqB,IAAV9O,EACP,OAAOwQ,EAAAA,GAAWC,UAAUzQ,EAAM,IAElCqB,QAAQgP,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB5J,KAAKsI,WAAWyB,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgB5J,KAAKsI,WAAWyB,GAGjF,CAAC,MAAOxN,GACL,MAAM,IAAIlD,MAAM,UAAUkD,oCAAwCwN,IACrE,EAGL,sBAAMI,CAAiBnD,GACnB,IACI,GAAKhH,KAAKmI,MAAMiB,IAAIpC,EAAIuD,UAAavK,KAAKoI,YAOnC,CACH,MAAMoC,EAAyBxK,KAAKmI,MAAM3K,IAAIwJ,EAAIuD,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgBzD,EAAIiC,eACpByB,QAAgC1K,KAAKsK,gBAAgBtD,EAAI2D,OAAQ3D,EAAIuD,SAI3E,OAHIvK,KAAKoI,aACLpI,KAAKmI,MAAMzM,IAAIuO,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAOlO,GACL,MAAM,IAAIlD,MAAM,sCAAsCkD,IACzD,EAGL,oBAAMsO,GACF,OAAO7K,KAAKmK,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO9K,KAAKmK,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAOhL,KAAKmK,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAanL,KAAKmK,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAanL,KAAKmK,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAanL,KAAKmK,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAanL,KAAKmK,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAanL,KAAKmK,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAIxS,MAAM,2BASxB,cAAMyS,GACF,aAAa9L,KAAKmK,iBAAiBF,EAAqBxK,MAQ5D,eAAMsM,GACF,aAAa/L,KAAKmK,iBAAiBF,EAAqB+B,OAQ5D,oBAAMC,GACF,aAAajM,KAAKmK,iBAAiBF,EAAqBiC,aAQ5D,mBAAMC,GACF,aAAanM,KAAKmK,iBAAiBF,EAAqBmC,YAS5D,qBAAM/B,CAAgBrC,GAClB,OAAQA,GACJ,KAAKiC,EAAqBW,YAAYyB,SAClC,OAAOpC,EAAqBW,YAAY3B,eAC5C,KAAKgB,EAAqBc,eAAesB,SACrC,OAAOpC,EAAqBc,eAAe9B,eAC/C,KAAKgB,EAAqBgB,oBAAoBoB,SAC1C,OAAOpC,EAAqBgB,oBAAoBhC,eACpD,KAAKgB,EAAqBiC,YAAYG,SAClC,OAAOpC,EAAqBiC,YAAYjD,eAC5C,KAAKgB,EAAqBmC,WAAWC,SACjC,OAAOpC,EAAqBmC,WAAWnD,eAC3C,KAAKgB,EAAqBqC,UAAUD,SAChC,OAAOpC,EAAqBqC,UAAUrD,eAC1C,KAAKgB,EAAqBxK,KAAK4M,SAC3B,OAAOpC,EAAqBxK,KAAKwJ,eACrC,KAAKgB,EAAqBsC,oBAAoBF,SAC1C,OAAOpC,EAAqBsC,oBAAoBtD,eACpD,KAAKgB,EAAqB+B,MAAMK,SAC5B,OAAOpC,EAAqB+B,MAAM/C,eACtC,KAAKgB,EAAqBoB,iBAAiBgB,SACvC,OAAOpC,EAAqBoB,iBAAiBpC,eACjD,KAAKgB,EAAqBsB,2BAA2Bc,SACjD,OAAOpC,EAAqBsB,2BAA2BtC,eAC3D,KAAKgB,EAAqBwB,gBAAgBY,SACtC,OAAOpC,EAAqBwB,gBAAgBxC,eAChD,KAAKgB,EAAqB0B,0BAA0BU,SAChD,OAAOpC,EAAqB0B,0BAA0B1C,eAC1D,KAAKgB,EAAqB4B,2BAA2BQ,SACjD,OAAOpC,EAAqB4B,2BAA2B5C,eAC3D,KAAKgB,EAAqBuC,cAAcH,SACpC,OAAOpC,EAAqBuC,cAAcvD,eAC9C,QACI,IAEI,MAAM9G,QAAiB3E,EAAIwK,GACrByE,QAAatK,EAASsK,OAC5B,OAAqB5C,EAAAA,GAAanJ,WAAW+L,EAChD,CAAC,MAAOvM,GAEL,IACA,OAAqB2J,EAAAA,GAAaD,gBAAgB5J,KAAKsI,WAAWN,GACjE,CAAC,MAAO0E,GACL,OAAO,IAAIrT,MAAM,iCAAmCqT,EACvD,CACJ,GAIbC,gBAAAA,GACI,OAAO3M,KAAKmK,iBAAiBF,EAAqBuC,gBCrkB1D,MAAMI,EACF3E,SACA4E,kBAUAnQ,WAAAA,CAAYuL,EAAkB4E,GAAoB,GAC9C7M,KAAKiI,SAAWA,EAChBjI,KAAK6M,kBAAoBA,EAM7B,0BAAOC,GACH,OAAO,IAAIF,EAAoB3C,EAAqBW,YAAYL,SAAS,GAM7E,6BAAOwC,GACH,OAAO,IAAIH,EAAoB3C,EAAqBc,eAAeR,SAAS,GAMhF,iCAAOyC,GACH,OAAO,IAAIJ,EAAoB3C,EAAqBgB,oBAAoBV,SAAS,GAMrF,0BAAO0C,GACH,OAAO,IAAIL,EAAoB3C,EAAqBiC,YAAY3B,SAAS,GAM7E,yBAAO2C,GACH,OAAO,IAAIN,EAAoB3C,EAAqBmC,WAAW7B,SAAS,GAM5E,yBAAO4C,GACH,OAAO,IAAIP,EAAoB3C,EAAqBqC,UAAU/B,SAAS,GAM3E,oBAAO6C,GACH,OAAO,IAAIR,EAAoB3C,EAAqBxK,KAAK8K,SAAS,GAMtE,iCAAO8C,GACH,OAAO,IAAIT,EAAoB3C,EAAqBsC,oBAAoBhC,SAAS,GAMrF,qBAAO+C,GACH,OAAO,IAAIV,EAAoB3C,EAAqB+B,MAAMzB,SAAS,GAMvE,+BAAOgD,GACH,OAAO,IAAIX,EAAoB3C,EAAqBoB,iBAAiBd,SAAS,GAMlF,uCAAOiD,GACH,OAAO,IAAIZ,EAAoB3C,EAAqBsB,2BAA2BhB,SAAS,GAM5F,8BAAOkD,GACH,OAAO,IAAIb,EAAoB3C,EAAqBwB,gBAAgBlB,SAAS,GAMjF,sCAAOmD,GACH,OAAO,IAAId,EAAoB3C,EAAqB0B,0BAA0BpB,SAAS,GAM3F,uCAAOoD,GACH,OAAO,IAAIf,EAAoB3C,EAAqB4B,2BAA2BtB,SAAS,GAM5F,4BAAOqD,GACH,OAAO,IAAIhB,EAAoB3C,EAAqBuC,cAAcjC,SAAS,IAuDnF,MAAMsD,EACF1F,MAEAzL,WAAAA,GACIsD,KAAKmI,MAAQ,IAAI5P,IASrBsS,cAAAA,GACI,OAAO7K,KAAK8J,aAAa8C,EAAoBE,uBASjDhC,iBAAAA,GACI,OAAO9K,KAAK8J,aAAa8C,EAAoBG,0BAWjDlE,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC/I,KAAKmI,MAAMzM,IAAIoN,EAAO,CAACE,EAAWE,UAAWD,EAAaC,YAS9D8B,qBAAAA,GACI,OAAOhL,KAAK8J,aAAa8C,EAAoBI,8BA2BjDlD,YAAAA,CAAa/J,GACT,OAAO,IAAIlE,SAAQ,CAACC,EAASgS,KACzB,QAAelS,IAAXmE,EACA+N,EAAO,IAAIzU,MAAM,4DACd,CACH,MAAMyP,EAAQ/I,EAAOkI,SACf4E,EAAoB9M,EAAO8M,kBACjC,GAAI7M,KAAKmI,MAAMiB,IAAIN,GAAQ,CACvB,MAAOW,EAAiBC,GAAqB1J,KAAKmI,MAAM3K,IAAIsL,GACtDE,EAAaW,EAAAA,GAAWC,UAAUH,GAClCR,EAAeY,EAAAA,GAAaD,UAAUF,GAC5C,GAAImD,EAAmB,CACO7M,KAAK6M,kBAAkB/D,EAAOE,EAAYC,IAEhE6E,EAAQ,IAAIzU,MAAM,8CAA8CyP,KAEvE,CACDhN,EAAQ,CAACkN,EAAYC,GACxB,MACG6E,EAAO,IAAIzU,MAAM,+BAAiCyP,GAEzD,KAST+D,iBAAAA,CAAkBtC,EAAiBvB,EAAwBC,GACvD,OAAQsB,GACJ,KAAKN,EAAqBW,YAAYL,QAClC,OAAOvB,EAAW+E,sBAAwB9E,EAAa+E,uBAC3D,KAAK/D,EAAqBgB,oBAAoBV,QAC1C,OAAOvB,EAAWiF,6BAA+BhF,EAAaiF,8BAClE,KAAKjE,EAAqBiC,YAAY3B,QAClC,OAAOvB,EAAWmF,sBAAwBlF,EAAamF,uBAC3D,KAAKnE,EAAqBmC,WAAW7B,QACjC,OAAOvB,EAAWqF,qBAAuBpF,EAAaqF,sBAC1D,KAAKrE,EAAqBqC,UAAU/B,QAChC,OAAOvB,EAAWuF,qBAAuBtF,EAAauF,sBAC1D,KAAKvE,EAAqBxK,KAAK8K,QAC3B,OAAOvB,EAAWyF,gBAAkBxF,EAAayF,iBACrD,KAAKzE,EAAqBsC,oBAAoBhC,QAC1C,OAAOvB,EAAW2F,6BAA+B1F,EAAa2F,8BAClE,KAAK3E,EAAqB+B,MAAMzB,QAC5B,OAAOvB,EAAW6F,iBAAmB5F,EAAa6F,kBACtD,KAAK7E,EAAqBoB,iBAAiBd,QACvC,OAAOvB,EAAW+F,2BAA6B9F,EAAa+F,4BAChE,KAAK/E,EAAqBsB,2BAA2BhB,QACjD,OAAOvB,EAAWiG,mCAAqChG,EAAaiG,oCACxE,KAAKjF,EAAqBwB,gBAAgBlB,QACtC,OAAOvB,EAAWmG,0BAA4BlG,EAAamG,2BAC/D,KAAKnF,EAAqB4B,2BAA2BtB,QACjD,OAAOvB,EAAWqG,mCAAqCpG,EAAaqG,oCACxE,KAAKrF,EAAqBuC,cAAcjC,QACpC,OAAOvB,EAAWuG,wBAA0BtG,EAAauG,yBAC7D,QACI,OAAO,GAUnBvD,cAAAA,GACI,OAAOjM,KAAK8J,aAAa8C,EAAoBK,uBASjDd,aAAAA,GACI,OAAOnM,KAAK8J,aAAa8C,EAAoBM,sBASjDpB,QAAAA,GACI,OAAO9L,KAAK8J,aAAa8C,EAAoBQ,iBASjDrB,SAAAA,GACI,OAAO/L,KAAK8J,aAAa8C,EAAoBU,kBAyBjDpC,YAAAA,CAAaC,GACT,GAAIC,EAAiBhC,IAAI+B,GACrB,OAAOnL,KAAK8J,aAAa8C,EAAoBW,4BAC1C,GAAIjC,EAA2BlC,IAAI+B,GACtC,OAAOnL,KAAK8J,aAAa8C,EAAoBY,oCAC1C,GAAIhC,EAAgBpC,IAAI+B,GAC3B,OAAOnL,KAAK8J,aAAa8C,EAAoBa,2BAC1C,GAAI/B,EAA0BtC,IAAI+B,GACrC,OAAOnL,KAAK8J,aAAa8C,EAAoBc,mCAC1C,GAAI9B,EAA2BxC,IAAI+B,GACtC,OAAOnL,KAAK8J,aAAa8C,EAAoBe,oCAE7C,MAAM,IAAItU,MAAM,2BASxB,sBAAMsT,GACF,OAAO3M,KAAK8J,aAAa8C,EAAoBgB,yBAUjD6B,oBAAAA,CAAqBzG,GACjB,IAAIA,EAAW+E,qBAGX,MAAM,IAAI1U,MAAM,4DAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBW,YAAYL,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAa6F,qBAAqBxG,YAa1HyG,2BAAAA,CAA4B3G,GACxB,IAAIA,EAAWiF,4BAGX,MAAM,IAAI5U,MAAM,oEAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBgB,oBAAoBV,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAa+F,4BAA4B1G,YAazI2G,oBAAAA,CAAqB7G,GACjB,IAAIA,EAAWmF,qBAGX,MAAM,IAAI9U,MAAM,4DAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBiC,YAAY3B,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAaiG,qBAAqB5G,YAa1H6G,mBAAAA,CAAoB/G,GAChB,IAAIA,EAAWqF,oBAGX,MAAM,IAAIhV,MAAM,2DAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBmC,WAAW7B,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAamG,oBAAoB9G,YAaxH+G,cAAAA,CAAejH,GACX,IAAIA,EAAWyF,eAGX,MAAM,IAAIpV,MAAM,qDAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBxK,KAAK8K,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAaqG,eAAehH,YAa7GiH,2BAAAA,CAA4BnH,GACxB,IAAIA,EAAW2F,4BAGX,MAAM,IAAItV,MAAM,oEAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBsC,oBAAoBhC,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAauG,4BAA4BlH,YAazImH,eAAAA,CAAgBrH,GACZ,IAAIA,EAAW6F,gBAGX,MAAM,IAAIxV,MAAM,sDAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqB+B,MAAMzB,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAayG,gBAAgBpH,YAa/GqH,yBAAAA,CAA0BvH,GACtB,IAAIA,EAAW+F,0BAGX,MAAM,IAAI1V,MAAM,iEAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBoB,iBAAiBd,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAa2G,0BAA0BtH,YAapIuH,iCAAAA,CAAkCzH,GAC9B,IAAIA,EAAWiG,kCAGX,MAAM,IAAI5V,MAAM,2EAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBsB,2BAA2BhB,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAa6G,kCAAkCxH,YAatJyH,wBAAAA,CAAyB3H,GACrB,IAAIA,EAAWmG,yBAGX,MAAM,IAAI9V,MAAM,gEAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBwB,gBAAgBlB,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAa+G,yBAAyB1H,YAalI2H,iCAAAA,CAAkC7H,GAC9B,IAAIA,EAAWqG,kCAGX,MAAM,IAAIhW,MAAM,2EAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqB4B,2BAA2BtB,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAaiH,kCAAkC5H,YAMtJ6H,sBAAAA,CAAuB/H,GACnB,IAAIA,EAAWuG,uBAGX,MAAM,IAAIlW,MAAM,8DAFhB2G,KAAKmI,MAAMzM,IAAIuO,EAAqBuC,cAAcjC,QAAS,CAACvB,EAAWE,UAAWW,EAAAA,GAAamH,uBAAuB9H,aChclI,MAAM+H,EACFrO,QACAsO,cACAxU,WAAAA,CAAYkG,EAAkBsO,GAC1BlR,KAAK4C,QAAUA,EACf5C,KAAKkR,cAAgBA,EAQzBrO,UAAAA,CAAWD,GACP5C,KAAK4C,QAAUA,EA+BnB,wBAAMuO,CAAmB3L,EAAwB4L,EAAkB7N,EAAmB8N,GAClF,IAAIlO,EAAc,EACdC,EAAY,EAahB,GAXIiO,IACI,gBAAiBA,GAA4D,iBAAjCA,EAA4B,YACxElO,EAAckO,EAA8B,aAG5C,cAAeA,GAA4D,iBAAjCA,EAA4B,YACtEjO,EAAYiO,EAA4B,YAK/B,GAAbjO,EAAgB,CAChB,MAAMK,QAAYzD,KAAKkR,cAAcjN,kBACrC,GAAIR,aAAepK,MACf,MAAM4N,EAAY,uDAEtB7D,EAAYK,CACf,CAGD,GAAIN,GAAeC,EACf,MAAM6D,EAAY,6CAGtB,aAAajH,KAAKkR,cAAchO,mBAAmBC,EAAaC,EAAWpD,KAAK4C,QAAQ/B,aAAc2E,OAAc5J,EAAW2H,GA8BnI,uBAAM+N,CAAkB9L,EAAsB4L,EAAkB7N,EAAmB8N,GAC/E,MAAM7N,QAAgBxD,KAAKmR,mBAAmB,CAAC3L,GAAe4L,EAAS7N,EAAQ8N,GAC/E,QAAM7N,aAAmBnK,QAAUmK,EAAQ1F,OAAS,EACzC0F,EAAQ,IAEnBhJ,QAAQ+B,MAAM,+BAAgCiH,GACvC,IAAInK,MAAM,qBAMrB,gBAAMkY,CAAWH,EAAkB7N,EAAmB8N,GAClD,MAAM,IAAIhY,MAAM,2BAMpB,iBAAMmY,CAAYJ,EAAkB7N,EAAmB8N,GACnD,MAAM,IAAIhY,MAAM,4BAuBxB,MAAMoY,EACFtO,YACAC,UACA1G,WAAAA,CAAYyG,EAAqBC,GAC7BpD,KAAKmD,YAAcA,EACnBnD,KAAKoD,UAAYA,GCjSzB,IAAIsO,EAAoC,KAElC,MAAAC,EAAmBA,KACrB,IAAKD,EAAiB,CAClB,MAAME,EAAS,IAAIC,OAAO,IAAIC,IAAI,kBAA+B,CAC7DnX,UAAM,IAEV+W,GAAkBxY,EAAAA,EAAAA,IAAgB0Y,EACrC,CACD,OAAOF,CAAe,ECkD1B,MAAMK,EACFnP,QACAoP,YACAtP,KACAwO,cACAe,eAQAvV,WAAAA,CAAYgG,EAA2BsP,EAA+CC,GAClFjS,KAAK0C,KAAOA,GAAc,mCAC1B1C,KAAKkR,cAAgB,IAAIzO,EAAkBzC,KAAK0C,MAEhD1C,KAAKgS,YAAcA,GAA4B,IAAI9J,EACnDlI,KAAKiS,eAAiBA,EAQ1BpP,UAAAA,CAAWD,GACP5C,KAAK4C,QAAUA,EAQnBsP,cAAAA,CAAeF,GACXhS,KAAKgS,YAAcA,EAQvBjP,OAAAA,CAAQL,GACJ1C,KAAK0C,KAAOA,EACZ1C,KAAKkR,cAAcnO,QAAQL,GAQ/ByP,iBAAAA,CAAkBF,GACdjS,KAAKiS,eAAiBA,EAkC1B,YAAMG,CACFvN,EACAwN,EACAC,EACAC,EACAC,EACA3R,GAGA,IACI,MAAM4R,EAAgB5M,EAAAA,GAAQnF,WAAWmE,GACzC,IAAIiC,EACJ,IACIA,QAAsB9G,KAAKkR,cAAc9K,WAAWqM,EAAc/X,KACrE,CAAC,MAAOwF,GAEL1F,QAAQkY,IAAI,WAAWD,EAAc/X,mDACxC,CACD,GAA4B,iBAAjBoM,EACP,KAAO,WAAW2L,EAAc/X,gEAEvC,CAAC,MAAOwF,GACL,MAAM+G,EAAY,6BAA6B/G,IAClD,CAGD,IAiBIyS,EAjBAC,EAAuB/R,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBb,KAAK4C,UACjDgQ,EAAuB5S,KAAK4C,QAAQ/B,mBAGJ,IAAzB+R,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCtS,KAAK6S,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB3W,CACnH,CAAC,MAAOsE,GACL,MAAM+G,EAAY,sDAAsD/G,sGAC3E,CAID,IACIyS,EAAUL,QAAoCtS,KAAKgS,YAAY/F,uBAA0CjM,KAAKgS,YAAY7F,eAC7H,CAAC,MAAOjM,GACL,MAAM+G,EAAY,iDAAiD/G,+DACtE,CACD,MAAO4S,EAAeC,GAAmBJ,EAGzC,IAAIlM,EACJ,IACIA,QAAgBzG,KAAKkR,cAAc1K,kBAAkB3B,EACxD,CAAC,MAAO3E,GACL,MAAM+G,EAAY,qDAAqD/G,yGAC1E,CAGD,MAAM8S,QAAWC,EAAAA,GAAmBC,2BAA2BN,EAAsB/N,EAASwN,EAAKG,EAAWxS,KAAK0C,KAAM+D,EAASqM,EAAeC,GACjJ,aAAa/S,KAAKkR,cAAcxJ,kBAAkBsL,GA8BtD,+BAAMG,CAA0BjR,GAE5B,MAAM,YACFkR,EAAW,aACXC,EAAY,IACZhB,EAAG,WACHC,EAAU,OACVgB,EAAM,mBACNf,EAAkB,gBAClBgB,EAAe,WACf1S,EAAU,aACV2S,GACAtR,EAEJ,IAAIsQ,EAAYtQ,EAAQsQ,UACpBxJ,EAAa9G,EAAQ8G,WACrBC,EAAe/G,EAAQ+G,aACvBpE,EAAU3C,EAAQ2C,QAClB4B,EAAUvE,EAAQuE,QAGtB,QAAgB7K,IAAZiJ,EACA,IACIA,QAAyB7E,KAAKkR,cAAc9K,WAAWgN,EAC1D,CAAC,MAAOlT,GACL,MAAM+G,EAAY,iBAAiBmM,yBAAmClT,qGACzE,MACM2E,aAAmBgB,EAAAA,KAC1BhB,EAAUA,EAAQ5G,YAItB,IAiBI0U,EAjBAc,EAAsB5S,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBb,KAAK4C,UACjD6Q,EAAsBzT,KAAK4C,QAAQ/B,mBAGJ,IAAxB4S,EACP,KAAM,uEAIV,IACIjB,EAAYF,QAAoCtS,KAAK6S,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB3W,CACnH,CAAC,MAAOsE,GACL,MAAM+G,EAAY,sDAAsD/G,sGAC3E,CAID,IACIyS,EAAUL,QAAoCtS,KAAKgS,YAAY/F,uBAA0CjM,KAAKgS,YAAY7F,eAC7H,CAAC,MAAOjM,GACL,MAAM+G,EAAY,iDAAiD/G,+DACtE,CACD,MAAO4S,EAAeC,GAAmBJ,EAGzC,IAAK3J,IAAeC,EAChB,KACKD,EAAYC,SAAuCjJ,KAAKgS,YAAYlI,aAAayJ,EACrF,CAAC,MAAOrT,GACL1F,QAAQkY,IAAI,kDAAkDxS,4CACjE,CAKL,GADwB2F,EAAAA,GAAQnF,WAAWmE,GAAS8B,aAAa7I,OAC3C,IAAM2I,EACxB,IACIA,QAAgCzG,KAAKkR,cAAc1K,kBAAkB4M,EACxE,CAAC,MAAOlT,GACL,MAAM+G,EAAY,qDAAqD/G,yGAC1E,CAIL,aAAa+S,EAAAA,GAAmBE,0BAA0BM,EAAqB5O,EAASwO,EAAcC,EAAQjB,EAAKG,EAAWxS,KAAK0C,KAAM+D,EAASuC,EAAYC,EAAc6J,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQxR,GACV,MAAM8Q,QAAwBhT,KAAKmT,0BAA0BjR,GAC7D,aAAalC,KAAKkR,cAAcxJ,kBAAkBsL,GAoCtD,SAAMW,CACF9O,EACA+O,EACAN,EACAO,EACApN,EACA8M,EACAvK,EACAC,EACApI,EACA2S,GAGA,IAAIC,EAAsB5S,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBb,KAAK4C,UACjD6Q,EAAsBzT,KAAK4C,QAAQ/B,mBAGJ,IAAxB4S,EACP,KAAM,uEAIV,IAAKzK,IAAeC,EAChB,KACKD,EAAYC,SAAuCjJ,KAAKgS,YAAYlI,aAAayJ,EACrF,CAAC,MAAOrT,GACL1F,QAAQkY,IAAI,kDAAkDxS,4CACjE,CAOL,OAHA1F,QAAQkY,IAAI,2BACZlY,QAAQkY,IAAI,gBAAiB1J,GAC7BxO,QAAQkY,IAAI,kBAAmBzJ,GACxBgK,EAAAA,GAAmBa,uBAAuBL,EAAqB5O,EAAS+O,EAAeN,EAAQO,GAAgB,EAAOpN,EAASuC,EAAYC,EAAcjJ,KAAK0C,KAAM8Q,GAiB/K,UAAM/T,CACFsU,EACAC,EACA3B,EACAC,EACAC,EACAC,EACA3R,EACA2S,GAGA,IAUIb,EACA7G,EAXA2H,EAAsB5S,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBb,KAAK4C,UACjD6Q,EAAsBzT,KAAK4C,QAAQ/B,mBAGJ,IAAxB4S,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoCtS,KAAKgS,YAAY/F,uBAA0CjM,KAAKgS,YAAY7F,gBAC1HL,QAAkC9L,KAAKgS,YAAYlG,UACtD,CAAC,MAAO5L,GACL,MAAM+G,EAAY,iDAAiD/G,+DACtE,CACD,MAAO4S,EAAeC,GAAmBJ,GAClCsB,EAAgBC,GAAoBpI,EAG3C,IACI0G,EAAYF,QAAoCtS,KAAK6S,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB3W,CACnH,CAAC,MAAOsE,GACL,MAAM+G,EAAY,sDAAsD/G,sGAC3E,CAGD,IACI6T,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBzT,WAAWqT,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBzT,WAAWsT,EAC7F,CAAC,MAAO9T,GACL,MAAM+G,EAAY,kFACrB,CAGD,MAAM+L,QAAWC,EAAAA,GAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW3B,EAAKG,EAAWxS,KAAK0C,KAAMuR,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAaxT,KAAKkR,cAAcxJ,kBAAkBsL,GAyBtD,WAAMhH,CAAMqI,EAAqBC,EAAwCzT,EAAyB2S,GAE9F,IAUIzH,EAVA0H,EAAsB5S,EAK1B,QAJmC,IAAxB4S,QAA+D,IAAjBzT,KAAK4C,UAC1D6Q,EAAsBzT,KAAK4C,QAAQ/B,mBAGJ,IAAxB4S,EACP,KAAM,uEAKV,IACI1H,QAAmC/L,KAAKgS,YAAYjG,WACvD,CAAC,MAAO7L,GACL,MAAM+G,EAAY,iDAAiD/G,+DACtE,CACD,MAAOqU,EAAiBC,GAAqBzI,EAG7C,IACIuI,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBzT,WAAW4T,EACtG,CAAC,MAAOpU,GACL,MAAM+G,EAAY,8EACrB,CAGD,MAAM+L,QAAWC,EAAAA,GAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAActU,KAAK0C,KAAM6R,EAAiBC,EAAmBhB,GACzJ,aAAaxT,KAAKkR,cAAcxJ,kBAAkBsL,GAatD,oBAAM0B,CACF7P,EACA8P,EACArB,EACAzS,GAGA,IAAI4F,EAEAgN,EAAsB5S,OACS,IAAxB4S,IAEHA,OADwB,IAAjBzT,KAAK4C,QACU5C,KAAK4C,QAAQ/B,aAEb,IAAIF,EAAAA,IAKlC,IACI8F,QAAgBzG,KAAKkR,cAAc1K,kBAAkB3B,GACrD,MAAM2F,QAAgByI,EAAAA,GAAmB2B,kBACrCnB,EACA5O,EACA8P,EACArB,EACA7M,GAEJ,MAAO,CAAa+D,EAAQxB,aAA4BwB,EAAQvB,eACnE,CAAC,MAAO/I,GACL,MAAM+G,EAAY,qCAAqC/G,oEAC1D,EAgCL,8BAAM2U,CACFC,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACA3R,EACA2S,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUIrC,EACAzH,EAXAuI,EAAsB5S,EAK1B,QAJmC,IAAxB4S,QAA+D,IAAjBzT,KAAK4C,UAC1D6Q,EAAsBzT,KAAK4C,QAAQ/B,mBAGJ,IAAxB4S,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoCtS,KAAKgS,YAAY/F,uBAA0CjM,KAAKgS,YAAY7F,gBAC1HjB,QAAsClL,KAAKgS,YAAY9G,aAAa8J,EACvE,CAAC,MAAO9U,GACL,MAAM+G,EAAY,iDAAiD/G,+DACtE,CACD,MAAO4S,EAAeC,GAAmBJ,GAClCuC,EAAoBC,GAAwBjK,EAGnD,IAEI,MAAM3H,EAAmB,GACrB6R,EAAqBJ,IAErBV,QAAsCtU,KAAK6S,iBAAiBR,EAAK,GAAIiC,EAAc/B,GACnFhP,EAAOgC,KAAK+O,EAAapP,UAEzBoP,OAAe1Y,EAEnB4W,EAAYF,QAAoCtS,KAAK6S,iBAAiBR,EAAK9O,EAAQiP,EAAWD,QAAsB3W,CACvH,CAAC,MAAOsE,GACL,MAAM+G,EAAY,sDAAsD/G,sGAC3E,CAGD,aAAa+S,EAAAA,GAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAcjC,EAAKG,EAAWxS,KAAK0C,KAAMwS,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA1C,EACAxR,EACA2S,GAEA,OAAOxT,KAAK6U,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOzW,OAAWA,OAAWA,EAAWiF,EAAY2S,GAmB/H,4CAAM8B,CACFR,EACAC,EACA1C,EACAxR,EACA2S,GAEA,OAAOxT,KAAK6U,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAOzW,OAAWA,OAAWA,EAAWiF,EAAY2S,GA+B/H,cAAM7X,CACFmZ,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACA3R,EACA2S,GAEA,MAAMR,QAAwBhT,KAAK6U,yBAAyBC,EAAQC,EAAWC,EAAc3C,EAAKC,EAAYC,EAAoB+B,EAAc9B,EAAW3R,EAAY2S,GACvK,aAAaxT,KAAKkR,cAAcxJ,kBAAkBsL,GAiCtD,gCAAMuC,CAA2BC,EAAwBC,EAA2BC,EAA4BZ,EAAgB5S,EAAmC,CAAC,GAChK,MAAMyT,EAAevW,KAAKwW,MAAe,IAATd,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BhB,EAAMnQ,EAAQmQ,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,EAAgBC,EAAmBC,EAAoB,GAAGC,EAAa1X,iBAAgB,gBACjGsV,EAAkB,IAAIzL,EAAsB,CACxCC,UAAWkC,EAAqBW,YAAYD,OAC5C3C,YAAaiC,EAAqBW,YAAYyB,SAC9CpE,SAAU,6BACZ,QACFpD,EAAU7E,KAAK6V,oBACZC,GACH5T,EAEE6T,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa9V,KAAKmT,0BAA0B4C,GA6BhD,gBAAMC,CAAWR,EAAwBC,EAA2BC,EAA2BZ,EAAgB5S,EAAmC,CAAC,GAC/I,MAAM8Q,QAAwBhT,KAAKuV,2BAA2BC,EAAgBC,EAAmBC,EAAoBZ,EAAQ5S,GAC7H,aAAalC,KAAKkR,cAAcxJ,kBAAkBsL,GAiCtD,mCAAMiD,CAA8BR,EAA2BC,EAA4BZ,EAAgBoB,EAAoBhU,EAAmC,CAAC,GAC/J,MAAMyT,EAAevW,KAAKwW,MAAe,IAATd,GAE1BqB,EAAqB/W,KAAKwW,MAAMM,IAEhC,YACF9C,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BhB,EAAMnQ,EAAQmQ,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAmBC,EAAoB,GAAGC,EAAa1X,gBAAiB,GAAGkY,EAAmBlY,gBAAe,gBACvHsV,EAAkB,IAAIzL,EAAsB,CACxCC,UAAWkC,EAAqBc,eAAeJ,OAC/C3C,YAAaiC,EAAqBc,eAAesB,SACjDpE,SAAU,gCACZ,QACFpD,EAAU7E,KAAK6V,oBACZC,GACH5T,EAEE6T,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa9V,KAAKmT,0BAA0B4C,GA6BhD,mBAAMK,CAAcX,EAA2BC,EAA4BZ,EAAgBoB,EAAoBhU,EAAmC,CAAC,GAC/I,MAAM8Q,QAAwBhT,KAAKiW,8BAA8BR,EAAmBC,EAAoBZ,EAAQoB,EAAYhU,GAC5H,aAAalC,KAAKkR,cAAcxJ,kBAAkBsL,GAwBtD,kCAAMqD,CAA6Bb,EAAwBV,EAAgB5S,EAAmC,CAAC,GAC3G,MAAMyT,EAAevW,KAAKwW,MAAe,IAATd,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BhB,EAAMnQ,EAAQmQ,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,EAAgB,GAAGG,EAAa1X,iBAAgB,gBAC1DsV,EAAkB,IAAIzL,EAAsB,CACxCC,UAAWkC,EAAqBuC,cAAc7B,OAC9C3C,YAAaiC,EAAqBuC,cAAcH,SAChDpE,SAAU,+BACZ,QACFpD,EAAU7E,KAAK6V,oBACZC,GACH5T,EAEE6T,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,OAAO9V,KAAKmT,0BAA0B4C,GA4B1C,kBAAMO,CAAad,EAAwBV,EAAgB5S,EAAmC,CAAC,GAC3F,MAAM8Q,QAAwBhT,KAAKqW,6BAA6Bb,EAAgBV,EAAQ5S,GACxF,aAAalC,KAAKkR,cAAcxJ,kBAAkBsL,GAyBtD,uCAAMuD,CAAkCf,EAAwBtT,EAAmC,CAAC,GAChG,MAAM,YACFkR,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAMnQ,EAAQmQ,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,GAAe,gBACzBjC,EAAkB,IAAIzL,EAAsB,CACxCC,UAAWkC,EAAqBgB,oBAAoBN,OACpD3C,YAAaiC,EAAqBgB,oBAAoBoB,SACtDpE,SAAU,qCACZ,QACFpD,EAAU7E,KAAK6V,oBACZC,GACH5T,EAEE6T,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa9V,KAAKmT,0BAA0B4C,GAuBhD,uBAAMS,CAAkBhB,EAAwBtT,EAAmC,CAAC,GAChF,MAAM8Q,QAAwBhT,KAAKuW,kCAAkCf,EAAgBtT,GACrF,aAAalC,KAAKkR,cAAcxJ,kBAAkBsL,GAiCtD,uCAAMyD,CAAkCC,EAA0BxU,EAAmC,CAAC,GAClG,MAAM,YACFkR,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBgB,EAAS,CAACoD,EAAgBzY,YAAW,gBACrCsV,EAAkB,IAAIzL,EAAsB,CACxCC,UAAWkC,EAAqBsC,oBAAoB5B,OACpD3C,YAAaiC,EAAqBsC,oBAAoBF,SACtDpE,SAAU,wCAEX6N,GACH5T,EAEE6T,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa9V,KAAK0T,QAAQqC,GA8B9B,uBAAMY,CAAkBD,EAA0BxU,EAAmC,CAAC,GAClF,MAAM8Q,QAAmBhT,KAAKyW,kCAAkCC,EAAiBxU,GACjF,OAAOlC,KAAKkR,cAAcxJ,kBAAkBsL,GAShD4D,eAAAA,CAAgBC,GACZ,IACI,MAAMpS,EAAuBoS,EAAkBC,eACzCnC,EAAckC,EAAkBE,gBAChClS,EAAUgS,EAAkBzQ,aAC5B6C,EAAe4N,EAAkBxM,kBACvC,OAAO2M,EAAAA,EAAAA,IAAwBvS,EAAWwE,EAAcpE,EAAS8P,EACpE,CAAC,MAAMzU,GAEJ,OADA1F,QAAQC,KAAK,6EACN,CACV,EASLwc,uBAAAA,CAAwBpS,GACpB,OAAOgB,EAAAA,GAAQnF,WAAWmE,GAQ9BgR,cAAAA,GACI,OAAOhQ,EAAAA,GAAQqR,oBAQnBC,aAAAA,CAActS,GACV,IAEI,OADSgB,EAAAA,GAAQnF,WAAWmE,IACrB,CACV,CAAC,MAAO3E,GACL,OAAO,CACV,EAIL,sBAAM2S,CAAiBiC,EAAgBvR,EAAkByB,EAAmCjF,GACxF,IACI,OAAOiF,aAAkBmP,EAAAA,GAAkBnP,EAASmP,EAAAA,GAAgBzT,WAAmBsE,EAC1F,CAAC,MAAO9E,GACL,IACI,MAAM+R,EAAiCjS,KAAKiS,eAC5C,aAA+BA,EAAeX,kBAAkBwD,GAAQ,EAAMvR,EAAQxD,EACzF,CAAC,MAAOG,GACL,MAAM+G,EAAY,sDAAsD/G,sGAC3E,CACJ,GAKT,SAASkV,EAAqBJ,GAC1B,OAAOoC,EAAuBhO,IAAI4L,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOqC,EAAqBjO,IAAI4L,GAAgBA,EAC5C/N,EAAY,0BAA0B+N,8FAC9C,CCjwCA,MAAMvM,EAAY6O,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAMxO,EAAgBY,EAAAA,GAAqB4N,EAASxO,cAEpD,IAAKA,EACD,MAAM,IAAI5P,MAAM,wBAA0Boe,EAASxO,cAGvD,MAAO,CACHzP,KAAMie,EAASje,KACf+Q,QAASkN,EAASlN,QAClBI,OAAQ8M,EAAS9M,OACjB0B,SAAUoL,EAASpL,SACnBpD,eAER,CAEA,MAAMgB,EAAuB,CACzBW,YAAa4M,EAAQF,EAAAA,GAAS1M,eAC9BG,eAAgByM,EAAQF,EAAAA,GAASvM,kBACjCE,oBAAqBuM,EAAQF,EAAAA,GAASrM,uBACtCiB,YAAasL,EAAQF,EAAAA,GAASpL,eAC9BE,WAAYoL,EAAQF,EAAAA,GAASlL,cAC7BE,UAAWkL,EAAQF,EAAAA,GAAShL,aAC5B7M,KAAM+X,EAAQF,EAAAA,GAAS7X,QACvB8M,oBAAqBiL,EAAQF,EAAAA,GAAS/K,uBACtCP,MAAOwL,EAAQF,EAAAA,GAAStL,SACxBX,iBAAkBmM,EAAQF,EAAAA,GAASjM,oBACnCE,2BAA4BiM,EAAQF,EAAAA,GAAS/L,8BAC7CE,gBAAiB+L,EAAQF,EAAAA,GAAS7L,mBAClCE,0BAA2B6L,EAAQF,EAAAA,GAAS3L,6BAC5CE,2BAA4B2L,EAAQF,EAAAA,GAASzL,8BAC7CW,cAAegL,EAAQF,EAAAA,GAAS9K,iBAChCtC,OAAQ,SAASlD,GACb,OAAIhH,KAAK6G,eAAeG,GACZhH,KAAagH,GAEd,IAAI3N,MAAM,QAAQ2N,mBAK/BoQ,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEEtM,EAAmB,IAAIsM,IAAI,CAC7B,UACA,mBACA,oBAEEpM,EAA6B,IAAIoM,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEElM,EAAkB,IAAIkM,IAAI,CAC5B,SACA,kBACA,mBAEEhM,EAA4B,IAAIgM,IAAI,CACtC,mBACA,4BACA,2BAEE9L,EAA6B,IAAI8L,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAASzQ,EAAY1N,GAEjB,MADAiB,QAAQ+B,MAAMhD,GACRA,CACV,CA+BAyI,eAAe2V,IACXnd,QAAQC,KAAK,6DACjB","sources":["webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs","webpack://aleo-website/../src/account.ts","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/offline-key-provider.ts","webpack://aleo-website/../src/record-provider.ts","webpack://aleo-website/../src/managed-worker.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts"],"sourcesContent":["/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n","import {\n Address,\n PrivateKey,\n Signature,\n ViewKey,\n PrivateKeyCiphertext,\n RecordCiphertext,\n} from \"./index\";\n\ninterface AccountParam {\n privateKey?: string;\n seed?: Uint8Array;\n}\n\n/**\n * Key Management class. Enables the creation of a new Aleo Account, importation of an existing account from\n * an existing private key or seed, and message signing and verification functionality.\n *\n * An Aleo Account is generated from a randomly generated seed (number) from which an account private key, view key,\n * and a public account address are derived. The private key lies at the root of an Aleo account. It is a highly\n * sensitive secret and should be protected as it allows for creation of Aleo Program executions and arbitrary value\n * transfers. The View Key allows for decryption of a user's activity on the blockchain. The Address is the public\n * address to which other users of Aleo can send Aleo credits and other records to. This class should only be used\n * environments where the safety of the underlying key material can be assured.\n *\n * @example\n * // Create a new account\n * const myRandomAccount = new Account();\n *\n * // Create an account from a randomly generated seed\n * const seed = new Uint8Array([94, 91, 52, 251, 240, 230, 226, 35, 117, 253, 224, 210, 175, 13, 205, 120, 155, 214, 7, 169, 66, 62, 206, 50, 188, 40, 29, 122, 40, 250, 54, 18]);\n * const mySeededAccount = new Account({seed: seed});\n *\n * // Create an account from an existing private key\n * const myExistingAccount = new Account({privateKey: 'myExistingPrivateKey'})\n *\n * // Sign a message\n * const hello_world = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = myRandomAccount.sign(hello_world)\n *\n * // Verify a signature\n * myRandomAccount.verify(hello_world, signature)\n */\nexport class Account {\n _privateKey: PrivateKey;\n _viewKey: ViewKey;\n _address: Address;\n\n constructor(params: AccountParam = {}) {\n try {\n this._privateKey = this.privateKeyFromParams(params);\n } catch (e) {\n console.error(\"Wrong parameter\", e);\n throw new Error(\"Wrong Parameter\");\n }\n this._viewKey = ViewKey.from_private_key(this._privateKey);\n this._address = Address.from_private_key(this._privateKey);\n }\n\n /**\n * Attempts to create an account from a private key ciphertext\n * @param {PrivateKeyCiphertext | string} ciphertext\n * @param {string} password\n * @returns {PrivateKey | Error}\n *\n * @example\n * const ciphertext = PrivateKey.newEncrypted(\"password\");\n * const account = Account.fromCiphertext(ciphertext, \"password\");\n */\n public static fromCiphertext(ciphertext: PrivateKeyCiphertext | string, password: string) {\n try {\n ciphertext = (typeof ciphertext === \"string\") ? PrivateKeyCiphertext.fromString(ciphertext) : ciphertext;\n const _privateKey = PrivateKey.fromPrivateKeyCiphertext(ciphertext, password);\n return new Account({ privateKey: _privateKey.to_string() });\n } catch(e) {\n throw new Error(\"Wrong password or invalid ciphertext\");\n }\n }\n\n private privateKeyFromParams(params: AccountParam) {\n if (params.seed) {\n return PrivateKey.from_seed_unchecked(params.seed);\n }\n if (params.privateKey) {\n return PrivateKey.from_string(params.privateKey);\n }\n return new PrivateKey();\n }\n\n privateKey() {\n return this._privateKey;\n }\n\n viewKey() {\n return this._viewKey;\n }\n\n address() {\n return this._address;\n }\n\n toString() {\n return this.address().to_string()\n }\n\n /**\n * Encrypt the account's private key with a password\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n *\n * @example\n * const account = new Account();\n * const ciphertext = account.encryptAccount(\"password\");\n */\n encryptAccount(password: string) {\n return this._privateKey.toCiphertext(password);\n }\n\n /**\n * Decrypts a Record in ciphertext form into plaintext\n * @param {string} ciphertext\n * @returns {Record}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecord(\"record1ciphertext\");\n */\n decryptRecord(ciphertext: string) {\n return this._viewKey.decrypt(ciphertext);\n }\n\n /**\n * Decrypts an array of Records in ciphertext form into plaintext\n * @param {string[]} ciphertexts\n * @returns {Record[]}\n *\n * @example\n * const account = new Account();\n * const record = account.decryptRecords([\"record1ciphertext\", \"record2ciphertext\"]);\n */\n decryptRecords(ciphertexts: string[]) {\n return ciphertexts.map((ciphertext) => this._viewKey.decrypt(ciphertext));\n }\n\n /**\n * Determines whether the account owns a ciphertext record\n * @param {RecordCipherText | string} ciphertext\n * @returns {boolean}\n *\n * @example\n * // Create a connection to the Aleo network and an account\n * const connection = new NodeConnection(\"vm.aleo.org/api\");\n * const account = Account.fromCiphertext(\"ciphertext\", \"password\");\n *\n * // Get a record from the network\n * const record = connection.getBlock(1234);\n * const recordCipherText = record.transactions[0].execution.transitions[0].id;\n *\n * // Check if the account owns the record\n * if account.ownsRecord(recordCipherText) {\n * // Then one can do something like:\n * // Decrypt the record and check if it's spent\n * // Store the record in a local database\n * // Etc.\n * }\n */\n ownsRecordCiphertext(ciphertext: RecordCiphertext | string) {\n if (typeof ciphertext === 'string') {\n try {\n const ciphertextObject = RecordCiphertext.fromString(ciphertext);\n return ciphertextObject.isOwner(this._viewKey);\n }\n catch (e) {\n return false;\n }\n }\n else {\n return ciphertext.isOwner(this._viewKey);\n }\n }\n\n /**\n * Signs a message with the account's private key.\n * Returns a Signature.\n *\n * @param {Uint8Array} message\n * @returns {Signature}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * account.sign(message);\n */\n sign(message: Uint8Array) {\n return this._privateKey.sign(message);\n }\n\n /**\n * Verifies the Signature on a message.\n *\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n *\n * @example\n * const account = new Account();\n * const message = Uint8Array.from([104, 101, 108, 108, 111 119, 111, 114, 108, 100])\n * const signature = account.sign(message);\n * account.verify(message, signature);\n */\n verify(message: Uint8Array, signature: Signature) {\n return this._address.verify(message, signature);\n }\n\n}\n","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n FunctionKeyProvider,\n KeySearchParams,\n FunctionKeyPair,\n CachedKeyPair,\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\n\n/**\n * Search parameters for the offline key provider. This class implements the KeySearchParams interface and includes\n * a convenience method for creating a new instance of this class for each function of the credits.aleo program.\n *\n * @example\n * // If storing a key for a custom program function\n * offlineSearchParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * // If storing a key for a credits.aleo program function\n * bondPublicKeyParams = OfflineSearchParams.bondPublicKeyParams();\n */\nclass OfflineSearchParams implements KeySearchParams {\n cacheKey: string | undefined;\n verifyCreditsKeys: boolean | undefined;\n\n /**\n * Create a new OfflineSearchParams instance.\n *\n * @param {string} cacheKey - Key used to store the local function proving & verifying keys. This should be stored\n * under the naming convention \"programName/functionName\" (i.e. \"myprogram.aleo/myfunction\")\n * @param {boolean} verifyCreditsKeys - Whether to verify the keys against the credits.aleo program,\n * defaults to false, but should be set to true if using keys from the credits.aleo program\n */\n constructor(cacheKey: string, verifyCreditsKeys = false) {\n this.cacheKey = cacheKey;\n this.verifyCreditsKeys = verifyCreditsKeys;\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_public function of the credits.aleo program.\n */\n static bondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the bond_validator function of the credits.aleo program.\n */\n static bondValidatorKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.bond_validator.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the claim_unbond_public function of the\n */\n static claimUnbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_private function of the credits.aleo program.\n */\n static feePrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the fee_public function of the credits.aleo program.\n */\n static feePublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.fee_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the inclusion prover function.\n */\n static inclusionKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.inclusion.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the join function of the credits.aleo program.\n */\n static joinKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.join.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the set_validator_state function of the credits.aleo program.\n */\n static setValidatorStateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.set_validator_state.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the split function of the credits.aleo program.\n */\n static splitKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.split.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private function of the credits.aleo program.\n */\n static transferPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_private_to_public function of the credits.aleo program.\n */\n static transferPrivateToPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public function of the credits.aleo program.\n */\n static transferPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_as_signer function of the credits.aleo program.\n */\n static transferPublicAsSignerKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_as_signer.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the transfer_public_to_private function of the credits.aleo program.\n */\n static transferPublicToPrivateKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, true);\n }\n\n /**\n * Create a new OfflineSearchParams instance for the unbond_public function of the credits.aleo program.\n */\n static unbondPublicKeyParams(): OfflineSearchParams {\n return new OfflineSearchParams(CREDITS_PROGRAM_KEYS.unbond_public.locator, true);\n }\n}\n\n/**\n * A key provider meant for building transactions offline on devices such as hardware wallets. This key provider is not\n * able to contact the internet for key material and instead relies on the user to insert Aleo function proving &\n * verifying keys from local storage prior to usage.\n *\n * @example\n * // Create an offline program manager\n * const programManager = new ProgramManager();\n *\n * // Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * // Create the proving keys from the key bytes on the offline machine\n * console.log(\"Creating proving keys from local key files\");\n * const program = \"program hello_hello.aleo; function hello: input r0 as u32.public; input r1 as u32.private; add r0 r1 into r2; output r2 as u32.private;\";\n * const myFunctionProver = await getLocalKey(\"/path/to/my/function/hello_hello.prover\");\n * const myFunctionVerifier = await getLocalKey(\"/path/to/my/function/hello_hello.verifier\");\n * const feePublicProvingKeyBytes = await getLocalKey(\"/path/to/credits.aleo/feePublic.prover\");\n *\n * myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProver);\n * myFunctionVerifyingKey = VerifyingKey.fromBytes(myFunctionVerifier);\n * const feePublicProvingKey = ProvingKey.fromBytes(feePublicKeyBytes);\n *\n * // Create an offline key provider\n * console.log(\"Creating offline key provider\");\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys\n * // Cache the proving and verifying keys for the custom hello function\n * OfflineKeyProvider.cacheKeys(\"hello_hello.aleo/hello\", myFunctionProvingKey, myFunctionVerifyingKey);\n *\n * // Cache the proving key for the fee_public function (the verifying key is automatically cached)\n * OfflineKeyProvider.insertFeePublicKey(feePublicProvingKey);\n *\n * // Create an offline query using the latest state root in order to create the inclusion proof\n * const offlineQuery = new OfflineQuery(\"latestStateRoot\");\n *\n * // Insert the key provider into the program manager\n * programManager.setKeyProvider(offlineKeyProvider);\n *\n * // Create the offline search params\n * const offlineSearchParams = new OfflineSearchParams(\"hello_hello.aleo/hello\");\n *\n * // Create the offline transaction\n * const offlineExecuteTx = await this.buildExecutionTransaction(\"hello_hello.aleo\", \"hello\", 1, false, [\"5u32\", \"5u32\"], undefined, offlineSearchParams, undefined, undefined, undefined, undefined, offlineQuery, program);\n *\n * // Broadcast the transaction later on a machine with internet access\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const txId = await networkClient.broadcastTransaction(offlineExecuteTx);\n */\nclass OfflineKeyProvider implements FunctionKeyProvider {\n cache: Map;\n\n constructor() {\n this.cache = new Map();\n }\n\n /**\n * Get bond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondPublicKeyParams());\n };\n\n /**\n * Get bond_validator function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondValidatorKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.bondValidatorKeyParams());\n };\n\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.claimUnbondPublicKeyParams());\n };\n\n /**\n * Get arbitrary function key from the offline key provider cache.\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * /// First cache the keys from local offline resources\n * const offlineKeyProvider = new OfflineKeyProvider();\n * const myFunctionVerifyingKey = VerifyingKey.fromString(\"verifier...\");\n * const myFunctionProvingKeyBytes = await readBinaryFile('./resources/myfunction.prover');\n * const myFunctionProvingKey = ProvingKey.fromBytes(myFunctionProvingKeyBytes);\n *\n * /// Cache the keys for future use with a memorable locator\n * offlineKeyProvider.cacheKeys(\"myprogram.aleo/myfunction\", [myFunctionProvingKey, myFunctionVerifyingKey]);\n *\n * /// When they're needed, retrieve the keys from the cache\n *\n * /// First create a search parameter object with the same locator used to cache the keys\n * const keyParams = new OfflineSearchParams(\"myprogram.aleo/myfunction\");\n *\n * /// Then retrieve the keys\n * const [myFunctionProver, myFunctionVerifier] = await offlineKeyProvider.functionKeys(keyParams);\n */\n functionKeys(params?: KeySearchParams): Promise {\n return new Promise((resolve, reject) => {\n if (params === undefined) {\n reject(new Error(\"No search parameters provided, cannot retrieve keys\"));\n } else {\n const keyId = params.cacheKey;\n const verifyCreditsKeys = params.verifyCreditsKeys;\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId) as CachedKeyPair;\n const provingKey = ProvingKey.fromBytes(provingKeyBytes);\n const verifyingKey = VerifyingKey.fromBytes(verifyingKeyBytes);\n if (verifyCreditsKeys) {\n const keysMatchExpected = this.verifyCreditsKeys(keyId, provingKey, verifyingKey)\n if (!keysMatchExpected) {\n reject (new Error(`Cached keys do not match expected keys for ${keyId}`));\n }\n }\n resolve([provingKey, verifyingKey]);\n } else {\n reject(new Error(\"Keys not found in cache for \" + keyId));\n }\n }\n });\n };\n\n /**\n * Determines if the keys for a given credits function match the expected keys.\n *\n * @returns {boolean} Whether the keys match the expected keys\n */\n verifyCreditsKeys(locator: string, provingKey: ProvingKey, verifyingKey: VerifyingKey): boolean {\n switch (locator) {\n case CREDITS_PROGRAM_KEYS.bond_public.locator:\n return provingKey.isBondPublicProver() && verifyingKey.isBondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.locator:\n return provingKey.isClaimUnbondPublicProver() && verifyingKey.isClaimUnbondPublicVerifier();\n case CREDITS_PROGRAM_KEYS.fee_private.locator:\n return provingKey.isFeePrivateProver() && verifyingKey.isFeePrivateVerifier();\n case CREDITS_PROGRAM_KEYS.fee_public.locator:\n return provingKey.isFeePublicProver() && verifyingKey.isFeePublicVerifier();\n case CREDITS_PROGRAM_KEYS.inclusion.locator:\n return provingKey.isInclusionProver() && verifyingKey.isInclusionVerifier();\n case CREDITS_PROGRAM_KEYS.join.locator:\n return provingKey.isJoinProver() && verifyingKey.isJoinVerifier();\n case CREDITS_PROGRAM_KEYS.set_validator_state.locator:\n return provingKey.isSetValidatorStateProver() && verifyingKey.isSetValidatorStateVerifier();\n case CREDITS_PROGRAM_KEYS.split.locator:\n return provingKey.isSplitProver() && verifyingKey.isSplitVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private.locator:\n return provingKey.isTransferPrivateProver() && verifyingKey.isTransferPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator:\n return provingKey.isTransferPrivateToPublicProver() && verifyingKey.isTransferPrivateToPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public.locator:\n return provingKey.isTransferPublicProver() && verifyingKey.isTransferPublicVerifier();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator:\n return provingKey.isTransferPublicToPrivateProver() && verifyingKey.isTransferPublicToPrivateVerifier();\n case CREDITS_PROGRAM_KEYS.unbond_public.locator:\n return provingKey.isUnbondPublicProver() && verifyingKey.isUnbondPublicVerifier();\n default:\n return false;\n }\n }\n\n /**\n * Get fee_private function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePrivateKeyParams());\n };\n\n /**\n * Get fee_public function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.feePublicKeyParams());\n };\n\n /**\n * Get join function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.joinKeyParams());\n };\n\n /**\n * Get split function keys from the credits.aleo program. The keys must be cached prior to calling this\n * method for it to work.\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.splitKeyParams());\n };\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program.\n *\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new OfflineKeyProvider\n * const offlineKeyProvider = new OfflineKeyProvider();\n *\n * // Cache the keys for future use with the official locator\n * const transferPublicProvingKeyBytes = await readBinaryFile('./resources/transfer_public.prover.a74565e');\n * const transferPublicProvingKey = ProvingKey.fromBytes(transferPublicProvingKeyBytes);\n *\n * // Cache the transfer_public keys for future use with the OfflinKeyProvider's convenience method for\n * // transfer_public (the verifying key will be cached automatically)\n * offlineKeyProvider.insertTransferPublicKeys(transferPublicProvingKey);\n *\n * /// When they're needed, retrieve the keys from the cache\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateKeyParams());\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPrivateToPublicKeyParams());\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicKeyParams());\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicAsSignerKeyParams());\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return this.functionKeys(OfflineSearchParams.transferPublicToPrivateKeyParams());\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n };\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async unBondPublicKeys(): Promise {\n return this.functionKeys(OfflineSearchParams.unbondPublicKeyParams());\n };\n\n /**\n * Insert the proving and verifying keys for the bond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for bond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertBondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isBondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [provingKey.toBytes(), VerifyingKey.bondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for bond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the claim_unbond_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for claim_unbond_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertClaimUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isClaimUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.claim_unbond_public.locator, [provingKey.toBytes(), VerifyingKey.claimUnbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for claim_unbond_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_private.locator, [provingKey.toBytes(), VerifyingKey.feePrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the fee_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for fee_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertFeePublicKeys(provingKey: ProvingKey) {\n if (provingKey.isFeePublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.fee_public.locator, [provingKey.toBytes(), VerifyingKey.feePublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for fee_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the join function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for join before inserting them into the cache.\n *\n * @param provingKey\n */\n insertJoinKeys(provingKey: ProvingKey) {\n if (provingKey.isJoinProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.join.locator, [provingKey.toBytes(), VerifyingKey.joinVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for join\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the set_validator_state function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for set_validator_state before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSetValidatorStateKeys(provingKey: ProvingKey) {\n if (provingKey.isSetValidatorStateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.set_validator_state.locator, [provingKey.toBytes(), VerifyingKey.setValidatorStateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for set_validator_state\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the split function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for split before inserting them into the cache.\n *\n * @param provingKey\n */\n insertSplitKeys(provingKey: ProvingKey) {\n if (provingKey.isSplitProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.split.locator, [provingKey.toBytes(), VerifyingKey.splitVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for split\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_private_to_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_private_to_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPrivateToPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPrivateToPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_private_to_public.locator, [provingKey.toBytes(), VerifyingKey.transferPrivateToPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_private_to_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public.locator, [provingKey.toBytes(), VerifyingKey.transferPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public\");\n }\n }\n\n /**\n * Insert the proving and verifying keys for the transfer_public_to_private function into the cache. Only the proving key needs\n * to be inserted, the verifying key is automatically inserted by the SDK. This function will automatically check\n * that the keys match the expected checksum for transfer_public_to_private before inserting them into the cache.\n *\n * @param provingKey\n */\n insertTransferPublicToPrivateKeys(provingKey: ProvingKey) {\n if (provingKey.isTransferPublicToPrivateProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.transfer_public_to_private.locator, [provingKey.toBytes(), VerifyingKey.transferPublicToPrivateVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for transfer_public_to_private\");\n }\n }\n\n insertUnbondPublicKeys(provingKey: ProvingKey) {\n if (provingKey.isUnbondPublicProver()) {\n this.cache.set(CREDITS_PROGRAM_KEYS.unbond_public.locator, [provingKey.toBytes(), VerifyingKey.unbondPublicVerifier().toBytes()]);\n } else {\n throw new Error(\"Attempted to insert invalid proving keys for unbond_public\");\n }\n }\n}\n\n\nexport {OfflineKeyProvider, OfflineSearchParams}\n","import { logAndThrow, RecordPlaintext } from \"./index\";\nimport { Account } from \"./account\";\nimport { AleoNetworkClient } from \"./network-client\";\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface RecordSearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * Interface for a record provider. A record provider is used to find records for use in deployment and execution\n * transactions on the Aleo Network. A default implementation is provided by the NetworkRecordProvider class. However,\n * a custom implementation can be provided (say if records are synced locally to a database from the network) by\n * implementing this interface.\n */\ninterface RecordProvider {\n account: Account\n\n /**\n * Find a credits.aleo record with a given number of microcredits from the chosen provider\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, its nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const record2 = await recordProvider.findCreditsRecord(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find a list of credit.aleo records with a given number of microcredits from the chosen provider\n *\n * @param {number} microcreditAmounts A list of separate microcredit amounts to search for (e.g. [5000, 100000])\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} A list of records with a value greater or equal to the amounts specified if such records exist, otherwise an error\n *\n * @example\n * // A class implementing record provider can be used to find a record with a given number of microcredits\n * const records = await recordProvider.findCreditsRecords([5000, 5000], true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces array so that it is not\n * // found again if a subsequent search is performed\n * const nonces = [];\n * records.forEach(record => { nonces.push(record.nonce()) });\n * const records2 = await recordProvider.findCreditsRecord(5000, true, nonces);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n findCreditsRecords(microcreditAmounts: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find an arbitrary record\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * program: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.program = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, \"credits.aleo\", \"credits\");\n *\n * const record = await recordProvider.findRecord(true, [], params);\n */\n findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n\n /**\n * Find multiple records from arbitrary programs\n *\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * // The RecordSearchParams interface can be used to create parameters for custom record searches which can then\n * // be passed to the record provider. An example of how this would be done for the credits.aleo program is shown\n * // below.\n *\n * class CustomRecordSearch implements RecordSearchParams {\n * startHeight: number;\n * endHeight: number;\n * amount: number;\n * maxRecords: number;\n * programName: string;\n * recordName: string;\n * constructor(startHeight: number, endHeight: number, credits: number, maxRecords: number, programName: string, recordName: string) {\n * this.startHeight = startHeight;\n * this.endHeight = endHeight;\n * this.amount = amount;\n * this.maxRecords = maxRecords;\n * this.programName = programName;\n * this.recordName = recordName;\n * }\n * }\n *\n * const params = new CustomRecordSearch(0, 100, 5000, 2, \"credits.aleo\", \"credits\");\n * const records = await recordProvider.findRecord(true, [], params);\n */\n findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise;\n}\n\n/**\n * A record provider implementation that uses the official Aleo API to find records for usage in program execution and\n * deployment, wallet functionality, and other use cases.\n */\nclass NetworkRecordProvider implements RecordProvider {\n account: Account;\n networkClient: AleoNetworkClient;\n constructor(account: Account, networkClient: AleoNetworkClient) {\n this.account = account;\n this.networkClient = networkClient;\n }\n\n /**\n * Set the account used to search for records\n *\n * @param {Account} account The account to use for searching for records\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Find a list of credit records with a given number of microcredits by via the official Aleo API\n *\n * @param {number[]} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * */\n async findCreditsRecords(microcredits: number[], unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n let startHeight = 0;\n let endHeight = 0;\n\n if (searchParameters) {\n if (\"startHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n startHeight = searchParameters[\"startHeight\"];\n }\n\n if (\"endHeight\" in searchParameters && typeof searchParameters[\"endHeight\"] == \"number\") {\n endHeight = searchParameters[\"endHeight\"];\n }\n }\n\n // If the end height is not specified, use the current block height\n if (endHeight == 0) {\n const end = await this.networkClient.getLatestHeight();\n if (end instanceof Error) {\n throw logAndThrow(\"Unable to get current block height from the network\")\n }\n endHeight = end;\n }\n\n // If the start height is greater than the end height, throw an error\n if (startHeight >= endHeight) {\n throw logAndThrow(\"Start height must be less than end height\");\n }\n\n return await this.networkClient.findUnspentRecords(startHeight, endHeight, this.account.privateKey(), microcredits, undefined, nonces);\n }\n\n /**\n * Find a credit record with a given number of microcredits by via the official Aleo API\n *\n * @param {number} microcredits The number of microcredits to search for\n * @param {boolean} unspent Whether or not the record is unspent\n * @param {string[]} nonces Nonces of records already found so that they are not found again\n * @param {RecordSearchParams} searchParameters Additional parameters to search for\n * @returns {Promise} The record if found, otherwise an error\n *\n * @example\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits\n * const record = await recordProvider.findCreditsRecord(5000, true, []);\n *\n * // When a record is found but not yet used, it's nonce should be added to the nonces parameter so that it is not\n * // found again if a subsequent search is performed\n * const records = await recordProvider.findCreditsRecords(5000, true, [record.nonce()]);\n *\n * // When the program manager is initialized with the record provider it will be used to find automatically find\n * // fee records and amount records for value transfers so that they do not need to be specified manually\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n */\n async findCreditsRecord(microcredits: number, unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n const records = await this.findCreditsRecords([microcredits], unspent, nonces, searchParameters);\n if (!(records instanceof Error) && records.length > 0) {\n return records[0];\n }\n console.error(\"Record not found with error:\", records);\n return new Error(\"Record not found\");\n }\n\n /**\n * Find an arbitrary record. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecord(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n /**\n * Find multiple arbitrary records. WARNING: This function is not implemented yet and will throw an error.\n */\n async findRecords(unspent: boolean, nonces?: string[], searchParameters?: RecordSearchParams): Promise {\n throw new Error(\"Method not implemented.\");\n }\n\n}\n\n/**\n * BlockHeightSearch is a RecordSearchParams implementation that allows for searching for records within a given\n * block height range.\n *\n * @example\n * // Create a new BlockHeightSearch\n * const params = new BlockHeightSearch(89995, 99995);\n *\n * // Create a new NetworkRecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // The record provider can be used to find records with a given number of microcredits and the block height search\n * // can be used to find records within a given block height range\n * const record = await recordProvider.findCreditsRecord(5000, true, [], params);\n *\n */\nclass BlockHeightSearch implements RecordSearchParams {\n startHeight: number;\n endHeight: number;\n constructor(startHeight: number, endHeight: number) {\n this.startHeight = startHeight;\n this.endHeight = endHeight;\n }\n}\n\nexport { BlockHeightSearch, NetworkRecordProvider, RecordProvider, RecordSearchParams};\n","// Experimental example where SDK manages worker\n\nimport { wrap } from \"comlink\";\nimport { WorkerAPI } from './worker';\n\nlet singletonWorker: WorkerAPI | null = null;\n\nconst createAleoWorker = (): WorkerAPI => {\n if (!singletonWorker) {\n const worker = new Worker(new URL(\"worker.js\", import.meta.url), {\n type: \"module\",\n });\n singletonWorker = wrap(worker);\n }\n return singletonWorker;\n};\n\nexport { createAleoWorker };","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n"],"names":["proxyMarker","Symbol","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","val","transferHandlers","Map","canHandle","serialize","obj","port1","port2","MessageChannel","expose","deserialize","port","start","wrap","value","serialized","Error","isError","message","name","stack","Object","assign","ep","globalThis","allowedOrigins","addEventListener","callback","ev","data","origin","allowedOrigin","RegExp","test","isAllowedOrigin","console","warn","id","type","path","argumentList","map","fromWireValue","returnValue","parent","slice","reduce","prop","rawValue","apply","proxy","transfers","transferCache","set","transfer","undefined","Promise","resolve","catch","then","wireValue","transferables","toWireValue","postMessage","removeEventListener","closeEndPoint","error","TypeError","endpoint","constructor","isMessagePort","close","target","createProxy","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","FinalizationRegistry","newCount","get","isProxyReleased","Proxy","_target","unregister","unregisterProxy","length","r","p","toString","bind","_thisArg","rawArgumentList","last","processArguments","construct","register","registerProxy","processed","v","arr","Array","prototype","concat","handler","serializedValue","msg","fill","Math","floor","random","Number","MAX_SAFE_INTEGER","join","l","Account","_privateKey","_viewKey","_address","params","this","privateKeyFromParams","e","ViewKey","from_private_key","Address","fromCiphertext","ciphertext","password","PrivateKeyCiphertext","fromString","PrivateKey","fromPrivateKeyCiphertext","privateKey","to_string","seed","from_seed_unchecked","from_string","viewKey","address","encryptAccount","toCiphertext","decryptRecord","decrypt","decryptRecords","ciphertexts","ownsRecordCiphertext","isOwner","RecordCiphertext","sign","verify","signature","async","url","options","response","fetch","ok","status","post","method","AleoNetworkClient","host","headers","account","setAccount","getAccount","setHost","fetchData","json","findUnspentRecords","startHeight","endHeight","amounts","maxMicrocredits","nonces","records","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","transactions","j","confirmedTransaction","transaction","execution","transitions","k","transition","program","outputs","output","record","recordPlaintext","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","AleoKeyProviderParams","proverUri","verifierUri","cacheKey","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","arrayBuffer","Uint8Array","KEY_STORE","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","inner","unBondPublicKeys","OfflineSearchParams","verifyCreditsKeys","bondPublicKeyParams","bondValidatorKeyParams","claimUnbondPublicKeyParams","feePrivateKeyParams","feePublicKeyParams","inclusionKeyParams","joinKeyParams","setValidatorStateKeyParams","splitKeyParams","transferPrivateKeyParams","transferPrivateToPublicKeyParams","transferPublicKeyParams","transferPublicAsSignerKeyParams","transferPublicToPrivateKeyParams","unbondPublicKeyParams","OfflineKeyProvider","reject","isBondPublicProver","isBondPublicVerifier","isClaimUnbondPublicProver","isClaimUnbondPublicVerifier","isFeePrivateProver","isFeePrivateVerifier","isFeePublicProver","isFeePublicVerifier","isInclusionProver","isInclusionVerifier","isJoinProver","isJoinVerifier","isSetValidatorStateProver","isSetValidatorStateVerifier","isSplitProver","isSplitVerifier","isTransferPrivateProver","isTransferPrivateVerifier","isTransferPrivateToPublicProver","isTransferPrivateToPublicVerifier","isTransferPublicProver","isTransferPublicVerifier","isTransferPublicToPrivateProver","isTransferPublicToPrivateVerifier","isUnbondPublicProver","isUnbondPublicVerifier","insertBondPublicKeys","bondPublicVerifier","insertClaimUnbondPublicKeys","claimUnbondPublicVerifier","insertFeePrivateKeys","feePrivateVerifier","insertFeePublicKeys","feePublicVerifier","insertJoinKeys","joinVerifier","insertSetValidatorStateKeys","setValidatorStateVerifier","insertSplitKeys","splitVerifier","insertTransferPrivateKeys","transferPrivateVerifier","insertTransferPrivateToPublicKeys","transferPrivateToPublicVerifier","insertTransferPublicKeys","transferPublicVerifier","insertTransferPublicToPrivateKeys","transferPublicToPrivateVerifier","insertUnbondPublicKeys","unbondPublicVerifier","NetworkRecordProvider","networkClient","findCreditsRecords","unspent","searchParameters","findCreditsRecord","findRecord","findRecords","BlockHeightSearch","singletonWorker","createAleoWorker","worker","Worker","URL","ProgramManager","keyProvider","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initializeWasm"],"sourceRoot":""} \ No newline at end of file diff --git a/877.bundle.js b/877.bundle.js new file mode 100644 index 000000000..8d1e8d5f2 --- /dev/null +++ b/877.bundle.js @@ -0,0 +1,2 @@ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[877,258],{81:(_,t,e)=>{_.exports=e.p+"58342153fc9a001d7976.wasm"},977:(_,t,e)=>{_.exports=e.p+"2d6a4d794221941c07b8.js"},877:(_,t,e)=>{e.a(_,(async(_,r)=>{try{function i(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}let o;e.d(t,{$7:()=>B_,Ao:()=>q_,BP:()=>M_,Fs:()=>L_,KC:()=>U_,OS:()=>O_,Yc:()=>J_,ZD:()=>C_,ZF:()=>I_,ZX:()=>$_,pF:()=>D_});const a=new Array(128).fill(void 0);function s(_){return a[_]}a.push(void 0,null,!0,!1);let c=a.length;function g(_){_<132||(a[_]=c,c=_)}function w(_){const t=s(_);return g(_),t}const d="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&d.decode();let b=null;function l(){return null!==b&&b.buffer===o.memory.buffer||(b=new Uint8Array(o.memory.buffer)),b}function u(_,t){return _>>>=0,d.decode(l().slice(_,_+t))}function f(_){c===a.length&&a.push(a.length+1);const t=c;return c=a[t],a[t]=_,t}let p=0;const y="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},m=function(_,t){const e=y.encode(_);return t.set(e),{read:_.length,written:e.length}};function h(_,t,e){if(void 0===e){const e=y.encode(_),r=t(e.length,1)>>>0;return l().subarray(r,r+e.length).set(e),p=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=l();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=l().subarray(n+o,n+r);o+=m(_,t).written,n=e(n,r,o,1)>>>0}return p=o,n}function v(_){return null==_}let k=null;function P(){return null!==k&&k.buffer===o.memory.buffer||(k=new Int32Array(o.memory.buffer)),k}function S(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=S(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const x="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>{o.__wbindgen_export_3.get(_.dtor)(_.a,_.b)}));function V(_,t,e,r){const n={a:_,b:t,cnt:1,dtor:e},i=(..._)=>{n.cnt++;const t=n.a;n.a=0;try{return r(t,n.b,..._)}finally{0==--n.cnt?(o.__wbindgen_export_3.get(n.dtor)(t,n.b),x.unregister(n)):n.a=t}};return i.original=n,x.register(i,n,n),i}function F(_,t,e){o._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(_,t,f(e))}function T(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function R(_,t){const e=t(1*_.length,1)>>>0;return l().set(_,e/1),p=_.length,e}function z(_,t,e,r){try{const a=o.__wbindgen_add_to_stack_pointer(-16);T(_,q),T(t,p_),T(e,r_);const s=h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.verifyFunctionExecution(a,_.__wbg_ptr,t.__wbg_ptr,e.__wbg_ptr,s,c);var n=P()[a/4+0],i=P()[a/4+1];if(P()[a/4+2])throw w(i);return 0!==n}finally{o.__wbindgen_add_to_stack_pointer(16)}}let A=null;function O(){return null!==A&&A.buffer===o.memory.buffer||(A=new BigInt64Array(o.memory.buffer)),A}function j(_,t){return _>>>=0,l().subarray(_/1,_/1+t)}function K(_){o.runRayonThread(_)}function C(_,t){return w(o.initThreadPool(f(_),t))}function E(_,t){try{return _.apply(this,t)}catch(_){o.__wbindgen_exn_store(f(_))}}function M(_,t,e,r){o.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(_,t,f(e),f(r))}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_address_free(_>>>0)));let U=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,B.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_address_free(_)}static from_private_key(t){T(t,G);const e=o.address_from_private_key(t.__wbg_ptr);return _.__wrap(e)}static from_view_key(t){T(t,m_);const e=o.address_from_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.address_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.address_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}verify(_,t){const e=R(_,o.__wbindgen_malloc),r=p;T(t,b_);return 0!==o.address_verify(this.__wbg_ptr,e,r,t.__wbg_ptr)}};const I="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_execution_free(_>>>0)));let q=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,I.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,I.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_execution_free(_)}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.execution_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.execution_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const W="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_executionresponse_free(_>>>0)));let $=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,W.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,W.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_executionresponse_free(_)}getOutputs(){return w(o.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const _=o.executionresponse_getExecution(this.__wbg_ptr);return 0===_?void 0:q.__wrap(_)}getKeys(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.executionresponse_getKeys(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return L.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const _=o.executionresponse_getProvingKey(this.__wbg_ptr);return 0===_?void 0:a_.__wrap(_)}getVerifyingKey(){const _=o.executionresponse_getVerifyingKey(this.__wbg_ptr);return p_.__wrap(_)}getFunctionId(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.executionresponse_getFunctionId(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}getProgram(){const _=o.executionresponse_getProgram(this.__wbg_ptr);return r_.__wrap(_)}};const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_field_free(_>>>0)));let D=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,N.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,N.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_field_free(_)}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.field_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.field_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const J="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_keypair_free(_>>>0)));class L{static __wrap(_){_>>>=0;const t=Object.create(L.prototype);return t.__wbg_ptr=_,J.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,J.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_keypair_free(_)}constructor(_,t){T(_,a_);var e=_.__destroy_into_raw();T(t,p_);var r=t.__destroy_into_raw();const n=o.keypair_new(e,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.keypair_provingKey(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return a_.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.keypair_verifyingKey(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return p_.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_metadata_free(_>>>0)));let Z=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,H.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_metadata_free(_)}get name(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_name(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set name(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_name(this.__wbg_ptr,t,e)}get locator(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_locator(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set locator(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_locator(this.__wbg_ptr,t,e)}get prover(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_prover(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set prover(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_prover(this.__wbg_ptr,t,e)}get verifier(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set verifier(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_verifier(this.__wbg_ptr,t,e)}get verifyingKey(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}set verifyingKey(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;o.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,e)}static baseUrl(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.metadata_baseUrl(n);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static bond_public(){const t=o.metadata_bond_public();return _.__wrap(t)}static bond_validator(){const t=o.metadata_bond_validator();return _.__wrap(t)}static claim_unbond_public(){const t=o.metadata_claim_unbond_public();return _.__wrap(t)}static fee_private(){const t=o.metadata_fee_private();return _.__wrap(t)}static fee_public(){const t=o.metadata_fee_public();return _.__wrap(t)}static inclusion(){const t=o.metadata_inclusion();return _.__wrap(t)}static join(){const t=o.metadata_join();return _.__wrap(t)}static set_validator_state(){const t=o.metadata_set_validator_state();return _.__wrap(t)}static split(){const t=o.metadata_split();return _.__wrap(t)}static transfer_private(){const t=o.metadata_transfer_private();return _.__wrap(t)}static transfer_private_to_public(){const t=o.metadata_transfer_private_to_public();return _.__wrap(t)}static transfer_public(){const t=o.metadata_transfer_public();return _.__wrap(t)}static transfer_public_as_signer(){const t=o.metadata_transfer_public_as_signer();return _.__wrap(t)}static transfer_public_to_private(){const t=o.metadata_transfer_public_to_private();return _.__wrap(t)}static unbond_public(){const t=o.metadata_unbond_public();return _.__wrap(t)}};const Q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_offlinequery_free(_>>>0)));let X=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Q.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Q.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_offlinequery_free(_)}constructor(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.offlinequery_new(r,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return this.__wbg_ptr=t>>>0,this}finally{o.__wbindgen_add_to_stack_pointer(16)}}addStatePath(_,t){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p,a=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,a,s);var e=P()[r/4+0];if(P()[r/4+1])throw w(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.offlinequery_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.offlinequery_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_privatekey_free(_>>>0)));let G=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Y.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_privatekey_free(_)}constructor(){const _=o.privatekey_new();return this.__wbg_ptr=_>>>0,this}static from_seed_unchecked(t){const e=R(t,o.__wbindgen_malloc),r=p,n=o.privatekey_from_seed_unchecked(e,r);return _.__wrap(n)}static from_string(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.privatekey_from_string(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.privatekey_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}to_view_key(){const _=o.privatekey_to_view_key(this.__wbg_ptr);return m_.__wrap(_)}to_address(){const _=o.privatekey_to_address(this.__wbg_ptr);return U.__wrap(_)}sign(_){const t=R(_,o.__wbindgen_malloc),e=p,r=o.privatekey_sign(this.__wbg_ptr,t,e);return b_.__wrap(r)}static newEncrypted(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekey_newEncrypted(r,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return t_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return t_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const i=o.__wbindgen_add_to_stack_pointer(-16);T(t,t_);const a=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.privatekey_fromPrivateKeyCiphertext(i,t.__wbg_ptr,a,s);var r=P()[i/4+0],n=P()[i/4+1];if(P()[i/4+2])throw w(n);return _.__wrap(r)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_privatekeyciphertext_free(_>>>0)));let t_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,__.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_privatekeyciphertext_free(_)}static encryptPrivateKey(t,e){try{const i=o.__wbindgen_add_to_stack_pointer(-16);T(t,G);const a=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),s=p;o.privatekey_toCiphertext(i,t.__wbg_ptr,a,s);var r=P()[i/4+0],n=P()[i/4+1];if(P()[i/4+2])throw w(n);return _.__wrap(r)}finally{o.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return G.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.privatekeyciphertext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.privatekeyciphertext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}};const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_program_free(_>>>0)));let r_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,e_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_program_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.program_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.program_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}hasFunction(_){const t=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;return 0!==o.program_hasFunction(this.__wbg_ptr,t,e)}getFunctions(){return w(o.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.program_getMappings(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return w(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getRecordMembers(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.program_getStructMembers(r,this.__wbg_ptr,n,i);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=o.program_getCreditsProgram();return _.__wrap(t)}id(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.program_id(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}address(){try{const e=o.__wbindgen_add_to_stack_pointer(-16);o.program_address(e,this.__wbg_ptr);var _=P()[e/4+0],t=P()[e/4+1];if(P()[e/4+2])throw w(t);return U.__wrap(_)}finally{o.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){T(t,_);return 0!==o.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return w(o.program_getImports(this.__wbg_ptr))}};const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_programmanager_free(_>>>0)));let i_=class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_programmanager_free(_)}static buildDeploymentTransaction(_,t,e,r,n,i,a,s,c){T(_,G);const g=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),d=p;let b=0;v(r)||(T(r,w_),b=r.__destroy_into_raw());var l=v(n)?0:h(n,o.__wbindgen_malloc,o.__wbindgen_realloc),u=p;let y=0;v(a)||(T(a,a_),y=a.__destroy_into_raw());let m=0;v(s)||(T(s,p_),m=s.__destroy_into_raw());let k=0;v(c)||(T(c,X),k=c.__destroy_into_raw());return w(o.programmanager_buildDeploymentTransaction(_.__wbg_ptr,g,d,e,b,l,u,v(i)?0:f(i),y,m,k))}static estimateDeploymentFee(_,t){const e=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;return w(o.programmanager_estimateDeploymentFee(e,r,v(t)?0:f(t)))}static estimateProgramNameCost(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16),n=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;o.programmanager_estimateProgramNameCost(r,n,i);var t=O()[r/8+0],e=P()[r/4+2];if(P()[r/4+3])throw w(e);return BigInt.asUintN(64,t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(_,t,e,r,n,i,a,s,c,g,d){T(_,G);const b=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),l=p,u=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(s)||(T(s,a_),m=s.__destroy_into_raw());let k=0;v(c)||(T(c,p_),k=c.__destroy_into_raw());var P=v(g)?0:h(g,o.__wbindgen_malloc,o.__wbindgen_realloc),S=p;let x=0;v(d)||(T(d,X),x=d.__destroy_into_raw());return w(o.programmanager_executeFunctionOffline(_.__wbg_ptr,b,l,u,y,f(r),n,i,v(a)?0:f(a),m,k,P,S,x))}static buildExecutionTransaction(_,t,e,r,n,i,a,s,c,g,d,b,l){T(_,G);const u=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p,m=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),k=p;let P=0;v(i)||(T(i,w_),P=i.__destroy_into_raw());var S=v(a)?0:h(a,o.__wbindgen_malloc,o.__wbindgen_realloc),x=p;let V=0;v(c)||(T(c,a_),V=c.__destroy_into_raw());let F=0;v(g)||(T(g,p_),F=g.__destroy_into_raw());let R=0;v(d)||(T(d,a_),R=d.__destroy_into_raw());let z=0;v(b)||(T(b,p_),z=b.__destroy_into_raw());let A=0;v(l)||(T(l,X),A=l.__destroy_into_raw());return w(o.programmanager_buildExecutionTransaction(_.__wbg_ptr,u,y,m,k,f(r),n,P,S,x,v(s)?0:f(s),V,F,R,z,A))}static estimateExecutionFee(_,t,e,r,n,i,a,s,c){T(_,G);const g=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),d=p,b=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),l=p;var u=v(n)?0:h(n,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(a)||(T(a,a_),m=a.__destroy_into_raw());let k=0;v(s)||(T(s,p_),k=s.__destroy_into_raw());let P=0;v(c)||(T(c,X),P=c.__destroy_into_raw());return w(o.programmanager_estimateExecutionFee(_.__wbg_ptr,g,d,b,l,f(r),u,y,v(i)?0:f(i),m,k,P))}static estimateFinalizeFee(_,t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.programmanager_estimateFinalizeFee(n,i,a,s,c);var e=O()[n/8+0],r=P()[n/4+2];if(P()[n/4+3])throw w(r);return BigInt.asUintN(64,e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(_,t,e,r,n,i,a,s,c,g,d){T(_,G),T(t,w_);var b=t.__destroy_into_raw();T(e,w_);var l=e.__destroy_into_raw();let u=0;v(n)||(T(n,w_),u=n.__destroy_into_raw());var f=v(i)?0:h(i,o.__wbindgen_malloc,o.__wbindgen_realloc),y=p;let m=0;v(a)||(T(a,a_),m=a.__destroy_into_raw());let k=0;v(s)||(T(s,p_),k=s.__destroy_into_raw());let P=0;v(c)||(T(c,a_),P=c.__destroy_into_raw());let S=0;v(g)||(T(g,p_),S=g.__destroy_into_raw());let x=0;v(d)||(T(d,X),x=d.__destroy_into_raw());return w(o.programmanager_buildJoinTransaction(_.__wbg_ptr,b,l,r,u,f,y,m,k,P,S,x))}static buildSplitTransaction(_,t,e,r,n,i,a){T(_,G),T(e,w_);var s=e.__destroy_into_raw(),c=v(r)?0:h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),g=p;let d=0;v(n)||(T(n,a_),d=n.__destroy_into_raw());let b=0;v(i)||(T(i,p_),b=i.__destroy_into_raw());let l=0;v(a)||(T(a,X),l=a.__destroy_into_raw());return w(o.programmanager_buildSplitTransaction(_.__wbg_ptr,t,s,c,g,d,b,l))}static buildTransferTransaction(_,t,e,r,n,i,a,s,c,g,d,b,l){T(_,G);const u=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),f=p,y=h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),m=p;let k=0;v(n)||(T(n,w_),k=n.__destroy_into_raw());let P=0;v(a)||(T(a,w_),P=a.__destroy_into_raw());var S=v(s)?0:h(s,o.__wbindgen_malloc,o.__wbindgen_realloc),x=p;let V=0;v(c)||(T(c,a_),V=c.__destroy_into_raw());let F=0;v(g)||(T(g,p_),F=g.__destroy_into_raw());let R=0;v(d)||(T(d,a_),R=d.__destroy_into_raw());let z=0;v(b)||(T(b,p_),z=b.__destroy_into_raw());let A=0;v(l)||(T(l,X),A=l.__destroy_into_raw());return w(o.programmanager_buildTransferTransaction(_.__wbg_ptr,t,u,f,y,m,k,i,P,S,x,V,F,R,z,A))}static synthesizeKeyPair(_,t,e,r,n){T(_,G);const i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;return w(o.programmanager_synthesizeKeyPair(_.__wbg_ptr,i,a,s,c,f(r),v(n)?0:f(n)))}};const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_provingkey_free(_>>>0)));let a_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,o_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_provingkey_free(_)}isBondPublicProver(){return 0!==o.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==o.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==o.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==o.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==o.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==o.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==o.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==o.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==o.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==o.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==o.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==o.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==o.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==o.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==o.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_checksum(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}copy(){const t=o.provingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=R(t,o.__wbindgen_malloc),a=p;o.provingkey_fromBytes(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.provingkey_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_toBytes(n,this.__wbg_ptr);var _=P()[n/4+0],t=P()[n/4+1],e=P()[n/4+2];if(P()[n/4+3])throw w(e);var r=j(_,t).slice();return o.__wbindgen_free(_,1*t,1),r}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.provingkey_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const s_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_recordciphertext_free(_>>>0)));let c_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,s_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,s_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_recordciphertext_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.recordciphertext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordciphertext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}decrypt(_){try{const r=o.__wbindgen_add_to_stack_pointer(-16);T(_,m_),o.recordciphertext_decrypt(r,this.__wbg_ptr,_.__wbg_ptr);var t=P()[r/4+0],e=P()[r/4+1];if(P()[r/4+2])throw w(e);return w_.__wrap(t)}finally{o.__wbindgen_add_to_stack_pointer(16)}}isOwner(_){T(_,m_);return 0!==o.recordciphertext_isOwner(this.__wbg_ptr,_.__wbg_ptr)}};const g_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_recordplaintext_free(_>>>0)));let w_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,g_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,g_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_recordplaintext_free(_)}commitment(_,t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p,s=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),c=p;o.recordplaintext_commitment(n,this.__wbg_ptr,i,a,s,c);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return D.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.recordplaintext_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordplaintext_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}microcredits(){const _=o.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,_)}nonce(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.recordplaintext_nonce(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}serialNumberString(_,t,e){let r,n;try{const b=o.__wbindgen_add_to_stack_pointer(-16);T(_,G);const l=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),f=p,y=h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),m=p;o.recordplaintext_serialNumberString(b,this.__wbg_ptr,_.__wbg_ptr,l,f,y,m);var i=P()[b/4+0],a=P()[b/4+1],s=P()[b/4+2],c=P()[b/4+3],g=i,d=a;if(c)throw g=0,d=0,w(s);return r=g,n=d,u(g,d)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(r,n,1)}}};const d_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_signature_free(_>>>0)));let b_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,d_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,d_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_signature_free(_)}static sign(t,e){T(t,G);const r=R(e,o.__wbindgen_malloc),n=p,i=o.privatekey_sign(t.__wbg_ptr,r,n);return _.__wrap(i)}verify(_,t){T(_,U);const e=R(t,o.__wbindgen_malloc),r=p;return 0!==o.signature_verify(this.__wbg_ptr,_.__wbg_ptr,e,r)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.signature_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.signature_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const l_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_transaction_free(_>>>0)));let u_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,l_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,l_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_transaction_free(_)}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.transaction_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}transactionId(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_transactionId(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}transactionType(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.transaction_transactionType(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const f_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_verifyingkey_free(_>>>0)));let p_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,f_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,f_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_verifyingkey_free(_)}static bondPublicVerifier(){const t=o.verifyingkey_bondPublicVerifier();return _.__wrap(t)}static bondValidatorVerifier(){const t=o.verifyingkey_bondValidatorVerifier();return _.__wrap(t)}static claimUnbondPublicVerifier(){const t=o.verifyingkey_claimUnbondPublicVerifier();return _.__wrap(t)}static feePrivateVerifier(){const t=o.verifyingkey_feePrivateVerifier();return _.__wrap(t)}static feePublicVerifier(){const t=o.verifyingkey_feePublicVerifier();return _.__wrap(t)}static inclusionVerifier(){const t=o.verifyingkey_inclusionVerifier();return _.__wrap(t)}static joinVerifier(){const t=o.verifyingkey_joinVerifier();return _.__wrap(t)}static setValidatorStateVerifier(){const t=o.verifyingkey_setValidatorStateVerifier();return _.__wrap(t)}static splitVerifier(){const t=o.verifyingkey_splitVerifier();return _.__wrap(t)}static transferPrivateVerifier(){const t=o.verifyingkey_transferPrivateVerifier();return _.__wrap(t)}static transferPrivateToPublicVerifier(){const t=o.verifyingkey_transferPrivateToPublicVerifier();return _.__wrap(t)}static transferPublicVerifier(){const t=o.verifyingkey_transferPublicVerifier();return _.__wrap(t)}static transferPublicAsSignerVerifier(){const t=o.verifyingkey_transferPublicAsSignerVerifier();return _.__wrap(t)}static transferPublicToPrivateVerifier(){const t=o.verifyingkey_transferPublicToPrivateVerifier();return _.__wrap(t)}static unbondPublicVerifier(){const t=o.verifyingkey_unbondPublicVerifier();return _.__wrap(t)}isBondPublicVerifier(){return 0!==o.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==o.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==o.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==o.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==o.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==o.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==o.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==o.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==o.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==o.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==o.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==o.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==o.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==o.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==o.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_checksum(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}copy(){const t=o.verifyingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=R(t,o.__wbindgen_malloc),a=p;o.verifyingkey_fromBytes(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=o.__wbindgen_add_to_stack_pointer(-16),i=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),a=p;o.verifyingkey_fromString(n,i,a);var e=P()[n/4+0],r=P()[n/4+1];if(P()[n/4+2])throw w(r);return _.__wrap(e)}finally{o.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_toBytes(n,this.__wbg_ptr);var _=P()[n/4+0],t=P()[n/4+1],e=P()[n/4+2];if(P()[n/4+3])throw w(e);var r=j(_,t).slice();return o.__wbindgen_free(_,1*t,1),r}finally{o.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.verifyingkey_toString(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}};const y_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>o.__wbg_viewkey_free(_>>>0)));let m_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,y_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,y_.unregister(this),_}free(){const _=this.__destroy_into_raw();o.__wbg_viewkey_free(_)}static from_private_key(t){T(t,G);const e=o.privatekey_to_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=h(t,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p,n=o.viewkey_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=o.__wbindgen_add_to_stack_pointer(-16);o.viewkey_to_string(n,this.__wbg_ptr);var e=P()[n/4+0],r=P()[n/4+1];return _=e,t=r,u(e,r)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(_,t,1)}}to_address(){const _=o.address_from_view_key(this.__wbg_ptr);return U.__wrap(_)}decrypt(_){let t,e;try{const g=o.__wbindgen_add_to_stack_pointer(-16),d=h(_,o.__wbindgen_malloc,o.__wbindgen_realloc),b=p;o.viewkey_decrypt(g,this.__wbg_ptr,d,b);var r=P()[g/4+0],n=P()[g/4+1],i=P()[g/4+2],a=P()[g/4+3],s=r,c=n;if(a)throw s=0,c=0,w(i);return t=s,e=c,u(s,c)}finally{o.__wbindgen_add_to_stack_pointer(16),o.__wbindgen_free(t,e,1)}}};async function h_(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}function v_(){const _={wbg:{}};return _.wbg.__wbindgen_object_drop_ref=function(_){w(_)},_.wbg.__wbg_new_71801a555ad9f2aa=function(){return E((function(){return f(new XMLHttpRequest)}),arguments)},_.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return E((function(_,t,e){s(_).overrideMimeType(u(t,e))}),arguments)},_.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return E((function(_,t,e,r,n,i){s(_).open(u(t,e),u(r,n),0!==i)}),arguments)},_.wbg.__wbg_send_80d29985093c1ec5=function(){return E((function(_){s(_).send()}),arguments)},_.wbg.__wbg_response_7c2e2759084f7279=function(){return E((function(_){return f(s(_).response)}),arguments)},_.wbg.__wbg_status_d485fb5a478426fb=function(){return E((function(_){return s(_).status}),arguments)},_.wbg.__wbg_new_72fb9a18b5ae2624=function(){return f(new Object)},_.wbg.__wbindgen_string_new=function(_,t){return f(u(_,t))},_.wbg.__wbg_set_1f9b04f170055d33=function(){return E((function(_,t,e){return Reflect.set(s(_),s(t),s(e))}),arguments)},_.wbg.__wbg_new_ab6fd82b10560829=function(){return E((function(){return f(new Headers)}),arguments)},_.wbg.__wbindgen_object_clone_ref=function(_){return f(s(_))},_.wbg.__wbg_new_0d76b0581eca6298=function(){return E((function(){return f(new AbortController)}),arguments)},_.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return f(s(_).signal)},_.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return E((function(_,t,e,r,n){s(_).append(u(t,e),u(r,n))}),arguments)},_.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=s(_)instanceof Response}catch(_){t=!1}return t},_.wbg.__wbg_status_61a01141acd3cf74=function(_){return s(_).status},_.wbg.__wbg_url_5f6dc4009ac5f99d=function(_,t){const e=h(s(t).url,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbg_headers_9620bfada380764a=function(_){return f(s(_).headers)},_.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return f(Symbol.iterator)},_.wbg.__wbg_get_e3c254076557e348=function(){return E((function(_,t){return f(Reflect.get(s(_),s(t)))}),arguments)},_.wbg.__wbindgen_is_function=function(_){return"function"==typeof s(_)},_.wbg.__wbg_call_27c0f87801dedf93=function(){return E((function(_,t){return f(s(_).call(s(t)))}),arguments)},_.wbg.__wbindgen_is_object=function(_){const t=s(_);return"object"==typeof t&&null!==t},_.wbg.__wbg_next_40fc327bfc8770e6=function(_){return f(s(_).next)},_.wbg.__wbg_next_196c84450b364254=function(){return E((function(_){return f(s(_).next())}),arguments)},_.wbg.__wbg_done_298b57d23c0fc80c=function(_){return s(_).done},_.wbg.__wbg_value_d93c65011f51a456=function(_){return f(s(_).value)},_.wbg.__wbg_abort_2aa7521d5690750e=function(_){s(_).abort()},_.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return E((function(_){return f(JSON.stringify(s(_)))}),arguments)},_.wbg.__wbindgen_string_get=function(_,t){const e=s(t),r="string"==typeof e?e:void 0;var n=v(r)?0:h(r,o.__wbindgen_malloc,o.__wbindgen_realloc),i=p;P()[_/4+1]=i,P()[_/4+0]=n},_.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(u(_,t))},_.wbg.__wbindgen_bigint_from_u64=function(_){return f(BigInt.asUintN(64,_))},_.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return E((function(_,t,e){return f(s(_).call(s(t),s(e)))}),arguments)},_.wbg.__wbg_transaction_new=function(_){return f(u_.__wrap(_))},_.wbg.__wbg_keypair_new=function(_){return f(L.__wrap(_))},_.wbg.__wbindgen_module=function(){return f(x_.__wbindgen_wasm_module)},_.wbg.__wbindgen_memory=function(){return f(o.memory)},_.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,e,r){return f(i(s(_),s(t),s(e),r>>>0))},_.wbg.__wbg_executionresponse_new=function(_){return f($.__wrap(_))},_.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return f(new Array(_>>>0))},_.wbg.__wbg_set_d4638f722068f043=function(_,t,e){s(_)[t>>>0]=w(e)},_.wbg.__wbindgen_cb_drop=function(_){const t=w(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},_.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return f(new Array)},_.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return s(_).push(s(t))},_.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return E((function(_){return f(s(_).arrayBuffer())}),arguments)},_.wbg.__wbg_new_63b92bc8671ed464=function(_){return f(new Uint8Array(s(_)))},_.wbg.__wbg_length_c20a40f15020d68a=function(_){return s(_).length},_.wbg.__wbg_new_81740750da40724f=function(_,t){try{var e={a:_,b:t};const r=new Promise(((_,t)=>{const r=e.a;e.a=0;try{return M(r,e.b,_,t)}finally{e.a=r}}));return f(r)}finally{e.a=e.b=0}},_.wbg.__wbindgen_number_new=function(_){return f(_)},_.wbg.__wbg_new_abda76e883ba8a5f=function(){return f(new Error)},_.wbg.__wbg_stack_658279fe44541cf6=function(_,t){const e=h(s(t).stack,o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbg_error_f851667af71bcfc6=function(_,t){let e,r;try{e=_,r=t,console.error(u(_,t))}finally{o.__wbindgen_free(e,r,1)}},_.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return f(s(_).buffer)},_.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,e){return f(new Uint8Array(s(_),t>>>0,e>>>0))},_.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return E((function(_,t){s(_).randomFillSync(w(t))}),arguments)},_.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,e){return f(s(_).subarray(t>>>0,e>>>0))},_.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return E((function(_,t){s(_).getRandomValues(s(t))}),arguments)},_.wbg.__wbg_set_a47bac70306a19a7=function(_,t,e){s(_).set(s(t),e>>>0)},_.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return f(s(_).crypto)},_.wbg.__wbg_process_4a72847cc503995b=function(_){return f(s(_).process)},_.wbg.__wbg_versions_f686565e586dd935=function(_){return f(s(_).versions)},_.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return f(s(_).node)},_.wbg.__wbindgen_is_string=function(_){return"string"==typeof s(_)},_.wbg.__wbg_require_cca90b1a94a0255b=function(){return E((function(){return f(module.require)}),arguments)},_.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return f(s(_).msCrypto)},_.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return f(new Uint8Array(_>>>0))},_.wbg.__wbg_length_cd7af8117672b8b8=function(_){return s(_).length},_.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return f(s(_)[t>>>0])},_.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return E((function(){return f(self.self)}),arguments)},_.wbg.__wbg_window_c6fb939a7f436783=function(){return E((function(){return f(window.window)}),arguments)},_.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return E((function(){return f(globalThis.globalThis)}),arguments)},_.wbg.__wbg_global_207b558942527489=function(){return E((function(){return f(global.global)}),arguments)},_.wbg.__wbindgen_is_undefined=function(_){return void 0===s(_)},_.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return f(new Function(u(_,t)))},_.wbg.__wbg_has_0af94d20077affa2=function(){return E((function(_,t){return Reflect.has(s(_),s(t))}),arguments)},_.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return f(fetch(s(_)))},_.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return f(s(_).fetch(s(t)))},_.wbg.__wbindgen_debug_string=function(_,t){const e=h(S(s(t)),o.__wbindgen_malloc,o.__wbindgen_realloc),r=p;P()[_/4+1]=r,P()[_/4+0]=e},_.wbg.__wbindgen_throw=function(_,t){throw new Error(u(_,t))},_.wbg.__wbindgen_rethrow=function(_){throw w(_)},_.wbg.__wbg_then_a73caa9a87991566=function(_,t,e){return f(s(_).then(s(t),s(e)))},_.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return f(s(_).then(s(t)))},_.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(s(_))},_.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return f(s(_).queueMicrotask)},_.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return f(Promise.resolve(s(_)))},_.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return f(Atomics.waitAsync)},_.wbg.__wbg_new_8cccba86b0f574cb=function(_){return f(new Int32Array(s(_)))},_.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,e){return f(Atomics.waitAsync(s(_),t,e))},_.wbg.__wbg_async_19c0400d97cc72fe=function(_){return s(_).async},_.wbg.__wbg_value_571d60108110e917=function(_){return f(s(_).value)},_.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(_){const t=h("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),o.__wbindgen_malloc,o.__wbindgen_realloc),e=p;P()[_/4+1]=e,P()[_/4+0]=t},_.wbg.__wbg_new_d1187ae36d662ef9=function(){return E((function(_,t){return f(new Worker(u(_,t)))}),arguments)},_.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){s(_).onmessage=s(t)},_.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,e){return f(Array.of(s(_),s(t),s(e)))},_.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return E((function(_,t){s(_).postMessage(s(t))}),arguments)},_.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return f(s(_).data)},_.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return E((function(_,t,e){return f(new Request(u(_,t),s(e)))}),arguments)},_.wbg.__wbg_responseText_c67ed2d48db10769=function(){return E((function(_,t){const e=s(t).responseText;var r=v(e)?0:h(e,o.__wbindgen_malloc,o.__wbindgen_realloc),n=p;P()[_/4+1]=n,P()[_/4+0]=r}),arguments)},_.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return f(V(_,t,538,F))},_.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return f(V(_,t,538,F))},_}function k_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function P_(_,t){return o=_.exports,x_.__wbindgen_wasm_module=t,A=null,k=null,b=null,o.__wbindgen_start(),o}function S_(_,t){if(void 0!==o)return o;const e=v_();k_(e,t),_ instanceof WebAssembly.Module||(_=new WebAssembly.Module(_));return P_(new WebAssembly.Instance(_,e),_)}async function x_(_,t){if(void 0!==o)return o;const e=v_();("string"==typeof _||"function"==typeof Request&&_ instanceof Request||"function"==typeof URL&&_ instanceof URL)&&(_=fetch(_)),k_(e,t);const{instance:r,module:n}=await h_(await _,e);return P_(r,n)}var n=Object.freeze({__proto__:null,Address:U,Execution:q,ExecutionResponse:$,Field:D,KeyPair:L,Metadata:Z,OfflineQuery:X,PrivateKey:G,PrivateKeyCiphertext:t_,Program:r_,ProgramManager:i_,ProvingKey:a_,RecordCiphertext:c_,RecordPlaintext:w_,Signature:b_,Transaction:u_,VerifyingKey:p_,ViewKey:m_,default:x_,initSync:S_,initThreadPool:C,runRayonThread:K,verifyFunctionExecution:z});const V_="assets/aleo_wasm.wasm";const{initThreadPool:F_,Address:T_,Execution:R_,ExecutionResponse:z_,Field:A_,Metadata:O_,OfflineQuery:j_,Private:K_,PrivateKey:C_,PrivateKeyCiphertext:E_,Program:M_,ProvingKey:B_,RecordCiphertext:U_,RecordPlaintext:I_,ProgramManager:q_,Signature:W_,Transaction:$_,ViewKey:N_,VerifyingKey:D_,verifyFunctionExecution:J_}=await(async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,i=V_;return null!=e&&(i=e+/[^\/\\]*$/.exec(i)[0]),null!=t&&(i=t(i)),null!=r?await r(x_,i):await x_(i),n})({importHook:()=>new URL(e(81),e.b)});async function L_(_){null==_&&(_=navigator.hardwareConcurrency),console.info(`Spawning ${_} threads`),await F_(new URL(e(977),e.b),_)}r()}catch(H_){r(H_)}}),1)}}]); +//# sourceMappingURL=877.bundle.js.map \ No newline at end of file diff --git a/877.bundle.js.map b/877.bundle.js.map new file mode 100644 index 000000000..59d330159 --- /dev/null +++ b/877.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"877.bundle.js","mappings":"wOAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,E,uHAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAQ,GAAGA,IAEf,GAAY,UAAR9D,EACA,MAAO,IAAI8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEA,UAAUA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EAClC,YAAY+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACR,GAAGoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAM,wBAAwB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,K,MAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,GAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,K,MAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,K,MAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,EAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,K,MAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,EAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,EAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,EAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,K,MAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,EAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,EAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,QAAIgC,GACA,IAAI8F,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0M,wBAAwBtG,EAAQwB,KAAKd,WAC1C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAI/F,CAAKyB,GACL,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK2M,wBAAwB/E,KAAKd,UAAWL,EAAMG,EAC3D,CAII,WAAIgG,GACA,IAAItD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6M,2BAA2BzG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIqD,CAAQ3H,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK8M,2BAA2BlF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAImG,GACA,IAAIzD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgN,0BAA0B5G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIwD,CAAO9H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKiN,0BAA0BrF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIsG,GACA,IAAI5D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,4BAA4B/G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAI2D,CAASjI,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,4BAA4BxF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqN,gCAAgCjH,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKsN,gCAAgC1F,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAO2G,GACH,IAAIjE,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwN,iBAAiBpH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOkE,GACH,MAAM7M,EAAMZ,EAAK0N,uBACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,qBAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,0BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,0BAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,+BACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,uBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,sBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,qBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,WAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,gBACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,0BAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,+BACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,YAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,iBACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,uBAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,4BACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,sCACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,2BACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,qCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,sCACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,CAII,oBAAOyO,GACH,MAAMzO,EAAMZ,EAAKsP,yBACjB,OAAO7C,EAASpE,OAAOzH,EAC/B,GAGA,MAAM2O,EAA4D,oBAAzBhL,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwP,wBAAwBhO,IAAQ,K,MAK3E,MAAMiO,EAEF,aAAOpH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkH,EAAajH,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB+N,EAAyB/K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByI,EAAyB9K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwP,wBAAwBhO,EACrC,CAKIuK,WAAAA,CAAY2D,GACR,IACI,MAAMtJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkN,EAAY1P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAK2P,iBAAiBvJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIuJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAM1J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBqN,EAAY7P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBsN,EAAY9P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEoJ,EAAOlO,EACb7B,EAAKgQ,0BAA0B5J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzE,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiQ,sBAAsB7J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWgG,GACd,IACI,MAAM9J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0N,EAAGlQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKmQ,wBAAwB/J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyI,EAAapH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+J,EAA0D,oBAAzB7L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqQ,sBAAsB7O,IAAQ,K,MAIzE,MAAM8O,EAEF,aAAOjI,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+H,EAAW9H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB4O,EAAuB5L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsJ,EAAuB3L,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqQ,sBAAsB7O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKuQ,iBAEjB,OADA3I,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO4I,CAAoBC,GACvB,MAAMhK,EAAOX,EAAkB2K,EAAMzQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAK0Q,+BAA+BjK,EAAMG,GACtD,OAAO0J,EAAWjI,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK2Q,uBAAuBvK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4Q,qBAAqBxK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,WAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,uBAAuBlJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOImQ,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKgR,sBAAsBpJ,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASIsQ,IAAAA,CAAK9M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOwQ,CAAaC,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKsR,wBAAwBlL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUImL,YAAAA,CAAaH,GACT,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOqL,CAAyBC,EAAYN,GACxC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAagM,EAAYJ,IACzB,MAAM9K,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4R,oCAAoCxL,EAAQuL,EAAW7K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwL,GAAoE,oBAAzBtN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8R,gCAAgCtQ,IAAQ,K,OAInF,MAAMuQ,EAEF,aAAO1J,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOwJ,EAAqBvJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBqQ,GAAiCrN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+K,GAAiCpN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8R,gCAAgCtQ,EAC7C,CAYI,wBAAOwQ,CAAkBpJ,EAAayI,GAClC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI4L,mBAAAA,CAAoBZ,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKkS,yCAAyC9L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,EAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmS,8BAA8B/L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWyH,GACd,IACI,MAAMvL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKoS,gCAAgChM,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMgM,GAAuD,oBAAzB9N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsS,mBAAmB9Q,IAAQ,K,OAItE,MAAM+Q,EAEF,aAAOlK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgK,EAAQ/J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB6Q,GAAoB7N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuL,GAAoB5N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsS,mBAAmB9Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKwS,mBAAmBpM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuL,EAAQlK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyS,iBAAiBrM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASImJ,WAAAA,CAAYC,GACR,MAAMlM,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK4S,oBAAoBhL,KAAKd,UAAWL,EAAMG,EAEnE,CAuBIiM,YAAAA,GAEI,OAAOlS,EADKX,EAAK8S,qBAAqBlL,KAAKd,WAEnD,CAyCIiM,iBAAAA,CAAkBJ,GACd,IACI,MAAMvM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAKgT,0BAA0B5M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI4M,WAAAA,GACI,IACI,MAAM7M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKkT,oBAAoB9M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI8M,gBAAAA,CAAiBC,GACb,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqT,yBAAyBjN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDIiN,gBAAAA,CAAiBC,GACb,IACI,MAAMnN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB+Q,EAAavT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKwT,yBAAyBpN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOoN,GACH,MAAM7S,EAAMZ,EAAK0T,4BACjB,OAAOnB,EAAQlK,OAAOzH,EAC9B,CAOI+S,EAAAA,GACI,IAAIrK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4T,WAAWxN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6T,gBAAgBzN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOiK,EAAQ5I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyN,OAAAA,CAAQC,GACJpO,EAAaoO,EAAOxB,GAEpB,OAAe,IADHvS,EAAKgU,gBAAgBpM,KAAKd,UAAWiN,EAAMjN,UAE/D,CA0BImN,UAAAA,GAEI,OAAOtT,EADKX,EAAKkU,mBAAmBtM,KAAKd,WAEjD,GAGA,MAAMqN,GAA8D,oBAAzB5P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoU,0BAA0B5S,IAAQ,K,OAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqN,GAA2B1P,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoU,0BAA0B5S,EACvC,CA8BI,iCAAO6S,CAA2BzL,EAAa1C,EAASoO,EAAaC,EAAYvV,EAAKwV,EAASC,EAAiBC,EAAmBC,GAC/HhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzB3I,EAAOsI,EAAW9L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9B+J,EAAON,EAAgBhM,sBAE3B,IAAIuM,EAAO,EACNhS,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChCyO,EAAON,EAAkBjM,sBAE7B,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKmV,0CAA0CvM,EAAY9B,UAAWL,EAAMG,EAAM0N,EAAarI,EAAM4I,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBlP,EAASsO,GAClC,MAAM/N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKqV,qCAAqC5O,EAAMG,EAAM5D,EAAWwR,GAAW,EAAI7S,EAAc6S,IAElH,CAaI,8BAAOc,CAAwB9R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKuV,uCAAuCnP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOsP,CAAuB/M,EAAa1C,EAAS0P,EAAWC,EAAQC,EAAiBC,EAAOvB,EAASxI,EAAa/F,EAAejH,EAAK2V,GACrIhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiW,sCAAsCrN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASC,EAAiBC,EAAO/S,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BtN,EAAa1C,EAAS0P,EAAWC,EAAQvB,EAAaC,EAAYvV,EAAKwV,EAASxI,EAAa/F,EAAewO,EAAiBC,EAAmBC,GAC7KhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1BgK,EAAOhJ,EAAYvD,sBAEvB,IAAIwM,EAAO,EACNjS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5B0O,EAAOhP,EAAcwC,sBAEzB,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuW,yCAAyC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMnT,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB5N,EAAa1C,EAAS0P,EAAWC,EAAQ7W,EAAKwV,EAASxI,EAAa/F,EAAe0O,GAC3GhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B+J,EAAO/I,EAAYvD,sBAEvB,IAAIuM,EAAO,EACNhS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5ByO,EAAO/O,EAAcwC,sBAEzB,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKyW,oCAAoC7N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAShB,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBxQ,EAAS0P,GAChC,IACI,MAAMxP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb7B,EAAK2W,mCAAmCvQ,EAAQK,EAAMG,EAAMqF,EAAM8D,GAClE,IAAIhJ,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOuQ,CAAqBhO,EAAaiO,EAAUC,EAAUxC,EAAaC,EAAYvV,EAAK+X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjKhP,EAAaiD,EAAaC,GAC1BlD,EAAakR,EAAUjC,IACvB,IAAInO,EAAOoQ,EAASpO,qBACpB9C,EAAamR,EAAUlC,IACvB,IAAI3I,EAAO6K,EAASrO,qBACpB,IAAIoM,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAW+T,KACZpR,EAAaoR,EAAkB/L,IAC/BgK,EAAO+B,EAAiBtO,sBAE5B,IAAIwM,EAAO,EACNjS,EAAWgU,KACZrR,EAAaqR,EAAoBzQ,IACjC0O,EAAO+B,EAAmBvO,sBAE9B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiX,oCAAoCrO,EAAY9B,UAAWL,EAAMwF,EAAMqI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBtO,EAAauO,EAAcC,EAAepY,EAAKqY,EAAmBC,EAAqB3C,GAChHhP,EAAaiD,EAAaC,GAC1BlD,EAAayR,EAAexC,IAC5B,IAAInO,EAAO2Q,EAAc3O,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACX,IAAIgT,EAAO,EACN7R,EAAWqU,KACZ1R,EAAa0R,EAAmBrM,IAChC6J,EAAOwC,EAAkB5O,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWsU,KACZ3R,EAAa2R,EAAqB/Q,IAClCwO,EAAOuC,EAAoB7O,sBAE/B,IAAIuM,EAAO,EACNhS,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5BF,EAAOL,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuX,qCAAqC3O,EAAY9B,UAAWqQ,EAAc1Q,EAAMwF,EAAM8D,EAAM8E,EAAME,EAAMC,GAEjI,CAgCI,+BAAOwC,CAAyB5O,EAAa6O,EAAgBC,EAAWC,EAAeP,EAAe9C,EAAaC,EAAYvV,EAAK4Y,EAAsBC,EAAwBpD,EAAiBC,EAAmBC,GAClNhP,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkBkV,EAAW1X,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBmV,EAAe3X,EAAK0G,kBAAmB1G,EAAK2G,oBACrEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAexC,IAC5BC,EAAOuC,EAAc3O,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBG,EAAOR,EAAW9L,sBAEtB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW4U,KACZjS,EAAaiS,EAAsB5M,IACnCiK,EAAO2C,EAAqBnP,sBAEhC,IAAI2N,EAAO,EACNpT,EAAW6U,KACZlS,EAAakS,EAAwBtR,IACrC6P,EAAOyB,EAAuBpP,sBAElC,IAAI4N,EAAO,EACNrT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BqL,EAAO5B,EAAgBhM,sBAE3B,IAAI6N,EAAO,EACNtT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC+P,EAAO5B,EAAkBjM,sBAE7B,IAAIqP,EAAO,EACN9U,EAAW2R,KACZhP,EAAagP,EAAeO,GAC5B4C,EAAOnD,EAAclM,sBAGzB,OAAO9H,EADKX,EAAK+X,wCAAwCnP,EAAY9B,UAAW2Q,EAAgBhR,EAAMG,EAAMqF,EAAM8D,EAAM8E,EAAMP,EAAaS,EAAMC,EAAMgB,EAAMf,EAAMmB,EAAMC,EAAMC,EAAMwB,GAE7L,CAeI,wBAAOE,CAAkBpP,EAAa1C,EAASC,EAAa0P,EAAQrB,GAChE7O,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EAEb,OAAOlB,EADKX,EAAKiY,iCAAiCrP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAS7S,EAAWwR,GAAW,EAAI7S,EAAc6S,IAExK,GAGA,MAAM0D,GAA0D,oBAAzB3T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmY,sBAAsB3W,IAAQ,K,OAIzE,MAAM4W,EAEF,aAAO/P,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6P,EAAW5P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0W,GAAuB1T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoR,GAAuBzT,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmY,sBAAsB3W,EACnC,CAWI6W,kBAAAA,GAEI,OAAe,IADHrY,EAAKsY,8BAA8B1Q,KAAKd,UAE5D,CAWIyR,qBAAAA,GAEI,OAAe,IADHvY,EAAKwY,iCAAiC5Q,KAAKd,UAE/D,CAWI2R,yBAAAA,GAEI,OAAe,IADHzY,EAAK0Y,qCAAqC9Q,KAAKd,UAEnE,CAWI6R,kBAAAA,GAEI,OAAe,IADH3Y,EAAK4Y,8BAA8BhR,KAAKd,UAE5D,CAWI+R,iBAAAA,GAEI,OAAe,IADH7Y,EAAK8Y,6BAA6BlR,KAAKd,UAE3D,CAWIiS,iBAAAA,GAEI,OAAe,IADH/Y,EAAKgZ,6BAA6BpR,KAAKd,UAE3D,CAWImS,YAAAA,GAEI,OAAe,IADHjZ,EAAKkZ,wBAAwBtR,KAAKd,UAEtD,CAWIqS,yBAAAA,GAEI,OAAe,IADHnZ,EAAKoZ,qCAAqCxR,KAAKd,UAEnE,CAWIuS,aAAAA,GAEI,OAAe,IADHrZ,EAAKsZ,yBAAyB1R,KAAKd,UAEvD,CAWIyS,uBAAAA,GAEI,OAAe,IADHvZ,EAAKwZ,mCAAmC5R,KAAKd,UAEjE,CAWI2S,+BAAAA,GAEI,OAAe,IADHzZ,EAAK0Z,2CAA2C9R,KAAKd,UAEzE,CAWI6S,sBAAAA,GAEI,OAAe,IADH3Z,EAAK4Z,kCAAkChS,KAAKd,UAEhE,CAWI+S,8BAAAA,GAEI,OAAe,IADH7Z,EAAK8Z,0CAA0ClS,KAAKd,UAExE,CAWIiT,+BAAAA,GAEI,OAAe,IADH/Z,EAAKga,2CAA2CpS,KAAKd,UAEzE,CAWImT,oBAAAA,GAEI,OAAe,IADHja,EAAKka,gCAAgCtS,KAAKd,UAE9D,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoa,oBAAoBhU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAKsa,gBAAgB1S,KAAKd,WACtC,OAAOsR,EAAW/P,OAAOzH,EACjC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAKya,qBAAqBrU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK2a,sBAAsBvU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6a,mBAAmBzU,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+a,oBAAoB3U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyR,GAAgE,oBAAzBzW,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKib,4BAA4BzZ,IAAQ,K,OAI/E,MAAM0Z,EAEF,aAAO7S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2S,EAAiB1S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChBwZ,GAA6BxW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkU,GAA6BvW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKib,4BAA4BzZ,EACzC,CASI,iBAAO0I,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKob,4BAA4BhV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkU,EAAiB7S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqb,0BAA0BjV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI+R,OAAAA,CAAQtS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKub,yBAAyBnV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4N,GAAgBvM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASImV,OAAAA,CAAQxS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAKyb,yBAAyB7T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM4U,GAA+D,oBAAzBnX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2b,2BAA2Bna,IAAQ,K,OAI9E,MAAMoa,EAEF,aAAOvT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqT,EAAgBpT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBka,GAA4BlX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4U,GAA4BjX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2b,2BAA2Bna,EACxC,CAMIqO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAK6b,2BAA2BzV,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GAC1E,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO8U,EAAMzT,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK+b,2BAA2B3V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4U,EAAgBvT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgc,yBAAyB5V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI0S,YAAAA,GACI,MAAMrb,EAAMZ,EAAKkc,6BAA6BtU,KAAKd,WACnD,OAAO2O,OAAOC,QAAQ,GAAI9U,EAClC,CAOIub,KAAAA,GACI,IAAI7S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoc,sBAAsBhW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI8S,kBAAAA,CAAmBzT,EAAagL,EAAYR,GACxC,IAAIkJ,EACAC,EACJ,IACI,MAAMnW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAKwc,mCAAmCpW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzG,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpC2O,EAAOhO,EACPoP,EAAOnP,EACX,GAAIyV,EAEA,MADA1H,EAAO,EAAGoB,EAAO,EACXxV,EAAW6U,GAIrB,OAFA8G,EAAcvH,EACdwH,EAAcpG,EACP5U,EAAmBwT,EAAMoB,EAC5C,CAAU,QACEnW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB6S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBnY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2c,qBAAqBnb,IAAQ,K,OAIxE,MAAMob,EAEF,aAAOvU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqU,EAAUpU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBkb,GAAsBlY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4V,GAAsBjY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2c,qBAAqBnb,EAClC,CAWI,WAAO0P,CAAKtI,EAAaxE,GACrBuB,EAAaiD,EAAaC,GAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOgW,EAAUvU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS8R,GACtB,MAAMxK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK6c,iBAAiBjV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK8c,sBAAsBrW,EAAMG,GAC7C,OAAOgW,EAAUvU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+c,oBAAoB3W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyT,GAA2D,oBAAzBzY,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKid,uBAAuBzb,IAAQ,K,OAO1E,MAAM0b,EAEF,aAAO7U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2U,EAAY1U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChBwb,GAAwBxY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkW,GAAwBvY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKid,uBAAuBzb,EACpC,CASI,iBAAO0I,CAAWiT,GACd,IACI,MAAM/W,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2a,EAAand,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKod,uBAAuBhX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkW,EAAY7U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqd,qBAAqBjX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI+T,aAAAA,GACI,IAAIhU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKud,0BAA0BnX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIiU,eAAAA,GACI,IAAIlU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyd,4BAA4BrX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMmU,GAA4D,oBAAzBnZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2d,wBAAwBnc,IAAQ,K,OAI3E,MAAMoc,EAEF,aAAOvV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqV,EAAapV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBkc,GAAyBlZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4W,GAAyBjZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2d,wBAAwBnc,EACrC,CAOI,yBAAOqc,GACH,MAAMjd,EAAMZ,EAAK8d,kCACjB,OAAOF,EAAavV,OAAOzH,EACnC,CAOI,4BAAOmd,GACH,MAAMnd,EAAMZ,EAAKge,qCACjB,OAAOJ,EAAavV,OAAOzH,EACnC,CAOI,gCAAOqd,GACH,MAAMrd,EAAMZ,EAAKke,yCACjB,OAAON,EAAavV,OAAOzH,EACnC,CAOI,yBAAOud,GACH,MAAMvd,EAAMZ,EAAKoe,kCACjB,OAAOR,EAAavV,OAAOzH,EACnC,CAOI,wBAAOyd,GACH,MAAMzd,EAAMZ,EAAKse,iCACjB,OAAOV,EAAavV,OAAOzH,EACnC,CAOI,wBAAO2d,GACH,MAAM3d,EAAMZ,EAAKwe,iCACjB,OAAOZ,EAAavV,OAAOzH,EACnC,CAOI,mBAAO6d,GACH,MAAM7d,EAAMZ,EAAK0e,4BACjB,OAAOd,EAAavV,OAAOzH,EACnC,CAOI,gCAAO+d,GACH,MAAM/d,EAAMZ,EAAK4e,yCACjB,OAAOhB,EAAavV,OAAOzH,EACnC,CAOI,oBAAOie,GACH,MAAMje,EAAMZ,EAAK8e,6BACjB,OAAOlB,EAAavV,OAAOzH,EACnC,CAOI,8BAAOme,GACH,MAAMne,EAAMZ,EAAKgf,uCACjB,OAAOpB,EAAavV,OAAOzH,EACnC,CAOI,sCAAOqe,GACH,MAAMre,EAAMZ,EAAKkf,+CACjB,OAAOtB,EAAavV,OAAOzH,EACnC,CAOI,6BAAOue,GACH,MAAMve,EAAMZ,EAAKof,sCACjB,OAAOxB,EAAavV,OAAOzH,EACnC,CAOI,qCAAOye,GACH,MAAMze,EAAMZ,EAAKsf,8CACjB,OAAO1B,EAAavV,OAAOzH,EACnC,CAOI,sCAAO2e,GACH,MAAM3e,EAAMZ,EAAKwf,+CACjB,OAAO5B,EAAavV,OAAOzH,EACnC,CAOI,2BAAO6e,GACH,MAAM7e,EAAMZ,EAAK0f,oCACjB,OAAO9B,EAAavV,OAAOzH,EACnC,CAOI+e,oBAAAA,GAEI,OAAe,IADH3f,EAAK4f,kCAAkChY,KAAKd,UAEhE,CAOI+Y,uBAAAA,GAEI,OAAe,IADH7f,EAAK8f,qCAAqClY,KAAKd,UAEnE,CAOIiZ,2BAAAA,GAEI,OAAe,IADH/f,EAAKggB,yCAAyCpY,KAAKd,UAEvE,CAOImZ,oBAAAA,GAEI,OAAe,IADHjgB,EAAKkgB,kCAAkCtY,KAAKd,UAEhE,CAOIqZ,mBAAAA,GAEI,OAAe,IADHngB,EAAKogB,iCAAiCxY,KAAKd,UAE/D,CAOIuZ,mBAAAA,GAEI,OAAe,IADHrgB,EAAKsgB,iCAAiC1Y,KAAKd,UAE/D,CAOIyZ,cAAAA,GAEI,OAAe,IADHvgB,EAAKwgB,4BAA4B5Y,KAAKd,UAE1D,CAOI2Z,2BAAAA,GAEI,OAAe,IADHzgB,EAAK0gB,yCAAyC9Y,KAAKd,UAEvE,CAOI6Z,eAAAA,GAEI,OAAe,IADH3gB,EAAK4gB,6BAA6BhZ,KAAKd,UAE3D,CAOI+Z,yBAAAA,GAEI,OAAe,IADH7gB,EAAK8gB,uCAAuClZ,KAAKd,UAErE,CAOIia,iCAAAA,GAEI,OAAe,IADH/gB,EAAKghB,+CAA+CpZ,KAAKd,UAE7E,CAOIma,wBAAAA,GAEI,OAAe,IADHjhB,EAAKkhB,sCAAsCtZ,KAAKd,UAEpE,CAOIqa,gCAAAA,GAEI,OAAe,IADHnhB,EAAKohB,8CAA8CxZ,KAAKd,UAE5E,CAOIua,iCAAAA,GAEI,OAAe,IADHrhB,EAAKshB,+CAA+C1Z,KAAKd,UAE7E,CAOIya,sBAAAA,GAEI,OAAe,IADHvhB,EAAKwhB,oCAAoC5Z,KAAKd,UAElE,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyhB,sBAAsBrb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAK0hB,kBAAkB9Z,KAAKd,WACxC,OAAO8W,EAAavV,OAAOzH,EACnC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK2hB,uBAAuBvb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4hB,wBAAwBxb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6hB,qBAAqBzb,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,sBAAsB1b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMwY,GAAuD,oBAAzBxd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKgiB,mBAAmBxgB,IAAQ,K,OAGtE,MAAMygB,EAEF,aAAO5Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO0Z,EAAQzZ,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBugB,GAAoBvd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBib,GAAoBtd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKgiB,mBAAmBxgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,GAC1B,MAAMjI,EAAMZ,EAAK8Q,uBAAuBlI,EAAY9B,WACpD,OAAOmb,EAAQ5Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKkiB,oBAAoBzb,EAAMG,GAC3C,OAAOqb,EAAQ5Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmiB,kBAAkB/b,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIwH,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASI0a,OAAAA,CAAQ3J,GACJ,IAAIyQ,EACAC,EACJ,IACI,MAAMjc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKsiB,gBAAgBlc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACP+N,EAAO9N,EACX,GAAIyV,EAEA,MADA5H,EAAO,EAAGC,EAAO,EACXnU,EAAW6U,GAIrB,OAFA4M,EAAcvN,EACdwN,EAAcvN,EACPvT,EAAmBsT,EAAMC,EAC5C,CAAU,QACE9U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB2Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,GAAWvjB,EAAQuV,GAC9B,GAAwB,mBAAbiO,UAA2BxjB,aAAkBwjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB1jB,EAAQuV,EAEtE,CAAc,MAAO3M,GACL,GAA0C,oBAAtC5I,EAAO2jB,QAAQhe,IAAI,gBAInB,MAAMiD,EAHNgb,QAAQC,KAAK,oMAAqMjb,EAKtO,CAGQ,MAAM2S,QAAcvb,EAAO8jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOhG,EAEpD,CAAW,CACH,MAAM5O,QAAiB8c,YAAYM,YAAY/jB,EAAQuV,GAEvD,OAAI5O,aAAoB8c,YAAYO,SACzB,CAAErd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASsd,KACL,MAAM1O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ2O,IAAIC,2BAA6B,SAASne,GAC9CtE,EAAWsE,EACnB,EACIuP,EAAQ2O,IAAIE,2BAA6B,WAAa,OAAO3b,GAAY,WAErE,OAAO/F,EADK,IAAI2hB,eAExB,GAAOC,UAAU,EACb/O,EAAQ2O,IAAIK,wCAA0C,WAAa,OAAO9b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMwe,iBAAiBliB,EAAmB2D,EAAMO,GAClE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIO,4BAA8B,WAAa,OAAOhc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,EAAMC,GAC9GvjB,EAAU4E,GAAM4e,KAAKtiB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACb/O,EAAQ2O,IAAIW,4BAA8B,WAAa,OAAOpc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM8e,MACxB,GAAOR,UAAU,EACb/O,EAAQ2O,IAAIa,gCAAkC,WAAa,OAAOtc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMgf,SAEpC,GAAOV,UAAU,EACb/O,EAAQ2O,IAAIe,8BAAgC,WAAa,OAAOxc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMkf,MAEpC,GAAOZ,UAAU,EACb/O,EAAQ2O,IAAIiB,2BAA6B,WAErC,OAAOziB,EADK,IAAI2G,OAExB,EACIkM,EAAQ2O,IAAIkB,sBAAwB,SAASpf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIsP,EAAQ2O,IAAImB,2BAA6B,WAAa,OAAO5c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY8e,QAAQliB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIqB,2BAA6B,WAAa,OAAO9c,GAAY,WAErE,OAAO/F,EADK,IAAI8iB,QAExB,GAAOlB,UAAU,EACb/O,EAAQ2O,IAAIuB,4BAA8B,SAASzf,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIuP,EAAQ2O,IAAIwB,2BAA6B,WAAa,OAAOjd,GAAY,WAErE,OAAO/F,EADK,IAAIijB,gBAExB,GAAOrB,UAAU,EACb/O,EAAQ2O,IAAI0B,8BAAgC,SAAS5f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM6f,OAEpC,EACItQ,EAAQ2O,IAAI4B,8BAAgC,WAAa,OAAOrd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,GAC1GtjB,EAAU4E,GAAM+f,OAAOzjB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GACxF,GAAOJ,UAAU,EACb/O,EAAQ2O,IAAI8B,2CAA6C,SAAShgB,GAC9D,IAAIigB,EACJ,IACIA,EAAS7kB,EAAU4E,aAAiBwd,QAChD,CAAU,MAAOte,GACL+gB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI1Q,EAAQ2O,IAAIgC,8BAAgC,SAASlgB,GAEjD,OADY5E,EAAU4E,GAAMkf,MAEpC,EACI3P,EAAQ2O,IAAIiC,2BAA6B,SAASngB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIkC,+BAAiC,SAASpgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM2d,QAEpC,EACIpO,EAAQ2O,IAAImC,gCAAkC,WAE1C,OAAO3jB,EADK4jB,OAAOC,SAE3B,EACIhR,EAAQ2O,IAAIsC,2BAA6B,WAAa,OAAO/d,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK4iB,QAAQ3f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIuC,uBAAyB,SAASzgB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIwC,4BAA8B,WAAa,OAAOje,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyC,qBAAuB,SAAS3gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIkR,EAAQ2O,IAAI0C,4BAA8B,SAAS5gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM6gB,KAEpC,EACItR,EAAQ2O,IAAI4C,4BAA8B,WAAa,OAAOre,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM6gB,OAEpC,GAAOvC,UAAU,EACb/O,EAAQ2O,IAAI6C,4BAA8B,SAAS/gB,GAE/C,OADY5E,EAAU4E,GAAMghB,IAEpC,EACIzR,EAAQ2O,IAAI+C,6BAA+B,SAASjhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAIiD,6BAA+B,SAASnhB,GAChD5E,EAAU4E,GAAMohB,OACxB,EACI7R,EAAQ2O,IAAImD,iCAAmC,WAAa,OAAO5e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOse,UAAU,EACb/O,EAAQ2O,IAAIoD,sBAAwB,SAASthB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIqD,2BAA6B,SAASvhB,EAAMC,GACpD2d,QAAQ4D,IAAIllB,EAAmB0D,EAAMC,GAC7C,EACIsP,EAAQ2O,IAAIuD,2BAA6B,SAASzhB,GAE9C,OAAOtD,EADK8T,OAAOC,QAAQ,GAAIzQ,GAEvC,EACIuP,EAAQ2O,IAAIwD,4BAA8B,WAAa,OAAOjf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIyD,sBAAwB,SAAS3hB,GAEzC,OAAOtD,EADKklB,GAAYxe,OAAOpD,GAEvC,EACIuP,EAAQ2O,IAAI2D,kBAAoB,SAAS7hB,GAErC,OAAOtD,EADKkJ,EAAQxC,OAAOpD,GAEnC,EACIuP,EAAQ2O,IAAI4D,kBAAoB,WAE5B,OAAOplB,EADKqlB,GAAWC,uBAE/B,EACIzS,EAAQ2O,IAAI+D,kBAAoB,WAE5B,OAAOvlB,EADK3B,EAAKd,OAEzB,EACIsV,EAAQ2O,IAAIgE,mCAAqC,SAASliB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIwM,EAAQ2O,IAAIiE,4BAA8B,SAASniB,GAE/C,OAAOtD,EADK0lB,EAAkBhf,OAAOpD,GAE7C,EACIuP,EAAQ2O,IAAImE,qCAAuC,SAASriB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIuP,EAAQ2O,IAAIoE,2BAA6B,SAAStiB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI+O,EAAQ2O,IAAIqE,mBAAqB,SAASviB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACI0P,EAAQ2O,IAAIsE,2BAA6B,WAErC,OAAO9lB,EADK,IAAIzB,MAExB,EACIsU,EAAQ2O,IAAIuE,4BAA8B,SAASziB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIsP,EAAQ2O,IAAIwE,mCAAqC,WAAa,OAAOjgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM8d,cAEpC,GAAOQ,UAAU,EACb/O,EAAQ2O,IAAIyE,2BAA6B,SAAS3iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI0E,8BAAgC,SAAS5iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI2E,2BAA6B,SAAS7iB,EAAMC,GACpD,IACI,IAAI6iB,EAAS,CAACjjB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN4oB,CAAC/iB,EAAMC,KACb,MAAMJ,EAAIijB,EAAOjjB,EACjBijB,EAAOjjB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGijB,EAAOhjB,EAAGE,EAAMC,EAChE,CAAkB,QACE6iB,EAAOjjB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEmnB,EAAOjjB,EAAIijB,EAAOhjB,EAAI,CAClC,CACA,EACIyP,EAAQ2O,IAAI8E,sBAAwB,SAAShjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIuP,EAAQ2O,IAAI+E,2BAA6B,WAErC,OAAOvmB,EADK,IAAIT,MAExB,EACIsT,EAAQ2O,IAAIgF,6BAA+B,SAASljB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIiF,6BAA+B,SAASnjB,EAAMC,GACtD,IAAImjB,EACAC,EACJ,IACID,EAAcpjB,EACdqjB,EAAcpjB,EACd2d,QAAQ0F,MAAMhnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB4e,EAAaC,EAAa,EAC3D,CACA,EACI9T,EAAQ2O,IAAIqF,8BAAgC,SAASvjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACImT,EAAQ2O,IAAIsF,kDAAoD,SAASxjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI+O,EAAQ2O,IAAIuF,sCAAwC,WAAa,OAAOhhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM0jB,eAAehoB,EAAWuE,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyF,gCAAkC,SAAS3jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI+O,EAAQ2O,IAAI0F,uCAAyC,WAAa,OAAOnhB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM6jB,gBAAgBzoB,EAAU6E,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI4F,2BAA6B,SAAS9jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI+O,EAAQ2O,IAAI6F,8BAAgC,SAAS/jB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMgkB,OAEpC,EACIzU,EAAQ2O,IAAI+F,+BAAiC,SAASjkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMkkB,QAEpC,EACI3U,EAAQ2O,IAAIiG,gCAAkC,SAASnkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMokB,SAEpC,EACI7U,EAAQ2O,IAAImG,4BAA8B,SAASrkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMskB,KAEpC,EACI/U,EAAQ2O,IAAIqG,qBAAuB,SAASvkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIsG,+BAAiC,WAAa,OAAO/hB,GAAY,WAEzE,OAAO/F,EADK1C,OAAOyqB,QAE3B,GAAOnG,UAAU,EACb/O,EAAQ2O,IAAIwG,gCAAkC,SAAS1kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM2kB,SAEpC,EACIpV,EAAQ2O,IAAI0G,qCAAuC,SAAS5kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIuP,EAAQ2O,IAAI2G,8BAAgC,SAAS7kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI4G,2BAA6B,SAAS9kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIsP,EAAQ2O,IAAI6G,4BAA8B,WAAa,OAAOtiB,GAAY,WAEtE,OAAO/F,EADKsoB,KAAKA,KAEzB,GAAO1G,UAAU,EACb/O,EAAQ2O,IAAI+G,8BAAgC,WAAa,OAAOxiB,GAAY,WAExE,OAAO/F,EADKwoB,OAAOA,OAE3B,GAAO5G,UAAU,EACb/O,EAAQ2O,IAAIiH,kCAAoC,WAAa,OAAO1iB,GAAY,WAE5E,OAAO/F,EADK0oB,WAAWA,WAE/B,GAAO9G,UAAU,EACb/O,EAAQ2O,IAAImH,8BAAgC,WAAa,OAAO5iB,GAAY,WAExE,OAAO/F,EADK4oB,OAAOA,OAE3B,GAAOhH,UAAU,EACb/O,EAAQ2O,IAAIqH,wBAA0B,SAASvlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIuP,EAAQ2O,IAAIsH,iCAAmC,SAASxlB,EAAMC,GAE1D,OAAOvD,EADK,IAAI+oB,SAASnpB,EAAmB0D,EAAMC,IAE1D,EACIsP,EAAQ2O,IAAIwH,2BAA6B,WAAa,OAAOjjB,GAAY,SAAUzC,EAAMC,GAErF,OADYqf,QAAQqG,IAAIvqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI0H,6BAA+B,SAAS5lB,GAEhD,OAAOtD,EADKmpB,MAAMzqB,EAAU4E,IAEpC,EACIuP,EAAQ2O,IAAI4H,6BAA+B,SAAS9lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM6lB,MAAMzqB,EAAU6E,IAEpD,EACIsP,EAAQ2O,IAAI6H,wBAA0B,SAAS/lB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAI8H,iBAAmB,SAAShmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIsP,EAAQ2O,IAAI+H,mBAAqB,SAASjmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIuP,EAAQ2O,IAAIgI,4BAA8B,SAASlmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI+O,EAAQ2O,IAAIkI,4BAA8B,SAASpmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,IAEnD,EACIsP,EAAQ2O,IAAImI,sCAAwC,SAASrmB,GACzDsmB,eAAelrB,EAAU4E,GACjC,EACIuP,EAAQ2O,IAAIqI,sCAAwC,SAASvmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMsmB,eAEpC,EACI/W,EAAQ2O,IAAIsI,+BAAiC,SAASxmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIuP,EAAQ2O,IAAIuI,iCAAmC,WAE3C,OAAO/pB,EADKgqB,QAAQC,UAE5B,EACIpX,EAAQ2O,IAAI0I,2BAA6B,SAAS5mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI2I,iCAAmC,SAAS7mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKgqB,QAAQC,UAAUvrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI+O,EAAQ2O,IAAI4I,6BAA+B,SAAS9mB,GAEhD,OADY5E,EAAU4E,GAAMsd,KAEpC,EACI/N,EAAQ2O,IAAI6I,6BAA+B,SAAS/mB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAI8I,iCAAmC,SAAShnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC0pB,mBAAmB,6OAO5BlsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIgJ,2BAA6B,WAAa,OAAOzkB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIiJ,oCAAsC,SAASnnB,EAAMC,GAC7D7E,EAAU4E,GAAMonB,UAAYhsB,EAAU6E,EAC9C,EACIsP,EAAQ2O,IAAImJ,0BAA4B,SAASrnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMqsB,GAAGlsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI+O,EAAQ2O,IAAIqJ,mCAAqC,WAAa,OAAO9kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIsJ,4BAA8B,SAASxnB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMynB,KAEpC,EACIlY,EAAQ2O,IAAIwJ,yCAA2C,WAAa,OAAOjlB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIirB,QAAQrrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAI0J,oCAAsC,WAAa,OAAOnlB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM4nB,aAC5B,IAAI7gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOsX,UAAU,EACb/O,EAAQ2O,IAAI4J,+BAAiC,SAAS9nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACIgP,EAAQ2O,IAAI6J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWgP,CACX,CAEA,SAASyY,GAAkBzY,EAAS0Y,GAChC1Y,EAAQ2O,IAAIjkB,OAASguB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,GAAoB3nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS4nB,QAChBxG,GAAWC,uBAAyBhoB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAKytB,mBACEztB,CACX,CAEA,SAAS0tB,GAASzuB,EAAQiuB,GACtB,QAAa9sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMwU,EAAU0O,KAEhB+J,GAAkBzY,EAAS0Y,GAErBjuB,aAAkByjB,YAAYiL,SAChC1uB,EAAS,IAAIyjB,YAAYiL,OAAO1uB,IAKpC,OAAOsuB,GAFU,IAAI7K,YAAYO,SAAShkB,EAAQuV,GAEbvV,EACzC,CAEAsjB,eAAeyE,GAAW4G,EAAOV,GAC7B,QAAa9sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMwU,EAAU0O,MAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,GAAkBzY,EAAS0Y,GAE3B,MAAM,SAAEtnB,EAAQ,OAAE3G,SAAiBujB,SAAiBoL,EAAOpZ,GAE3D,OAAO+Y,GAAoB3nB,EAAU3G,EACzC,CAEA,IAAIuuB,EAAuBllB,OAAOwlB,OAAO,CACrCC,UAAW,KACX3lB,QAAS6I,EACTjH,UAAW1D,EACXgE,kBAAmB+c,EACnB5b,MAAOqQ,EACPjR,QAASA,EACT4B,SAAUuhB,EACVve,aAAcyF,EACd5E,WAAYzH,EACZkJ,qBAAsBR,GACtBgB,QAAS/L,GACTynB,eAAgBC,GAChB9V,WAAYpN,GACZkQ,iBAAkBiT,GAClBvS,gBAAiBhH,GACjBgI,UAAWhT,GACXsT,YAAa2J,GACbjJ,aAAcrX,GACd0b,QAAShZ,GACTmlB,QAASpH,GACT0G,SAAUA,GACVjmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMsoB,GAAY,wBC57Ib,MACD5mB,eAAgB6mB,GAAkB,QAClClmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACRgD,GAAY,QACZ8e,GAAO,WACPje,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACP6F,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZ/W,SD26IoB0b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY7qB,KAAK+qB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAe3H,GAAY4H,SAG3B5H,GAAW4H,GAGdpB,CAAO,EC97IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,aAIvBtL,eAAe9a,GAAeqnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAK,YAAYH,mBAEnBR,GAAmB,IAAIT,IAAI,YAA+BiB,EACpE,C","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","__wbg_get_metadata_name","__wbg_set_metadata_name","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","log","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_transaction_new","Transaction$1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info"],"sourceRoot":""} \ No newline at end of file diff --git a/907.bundle.js b/907.bundle.js new file mode 100644 index 000000000..6fadbbe1d --- /dev/null +++ b/907.bundle.js @@ -0,0 +1,3 @@ +/*! For license information please see 907.bundle.js.LICENSE.txt */ +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[907,495,876],{720:(e,r,t)=>{t.d(r,{p:()=>u});const i=Symbol("Comlink.proxy"),n=Symbol("Comlink.endpoint"),a=Symbol("Comlink.releaseProxy"),o=Symbol("Comlink.finalizer"),s=Symbol("Comlink.thrown"),c=e=>"object"==typeof e&&null!==e||"function"==typeof e,h=new Map([["proxy",{canHandle:e=>c(e)&&e[i],serialize(e){const{port1:r,port2:t}=new MessageChannel;return u(e,r),[t,[t]]},deserialize(e){return e.start(),g(e,[],r);var r}}],["throw",{canHandle:e=>c(e)&&s in e,serialize({value:e}){let r;return r=e instanceof Error?{isError:!0,value:{message:e.message,name:e.name,stack:e.stack}}:{isError:!1,value:e},[r,[]]},deserialize(e){if(e.isError)throw Object.assign(new Error(e.value.message),e.value);throw e.value}}]]);function u(e,r=globalThis,t=["*"]){r.addEventListener("message",(function n(a){if(!a||!a.data)return;if(!function(e,r){for(const t of e){if(r===t||"*"===t)return!0;if(t instanceof RegExp&&t.test(r))return!0}return!1}(t,a.origin))return void console.warn(`Invalid origin '${a.origin}' for comlink proxy`);const{id:c,type:h,path:f}=Object.assign({path:[]},a.data),d=(a.data.argumentList||[]).map(b);let y;try{const r=f.slice(0,-1).reduce(((e,r)=>e[r]),e),t=f.reduce(((e,r)=>e[r]),e);switch(h){case"GET":y=t;break;case"SET":r[f.slice(-1)[0]]=b(a.data.value),y=!0;break;case"APPLY":y=t.apply(r,d);break;case"CONSTRUCT":y=function(e){return Object.assign(e,{[i]:!0})}(new t(...d));break;case"ENDPOINT":{const{port1:r,port2:t}=new MessageChannel;u(e,t),y=function(e,r){return w.set(e,r),e}(r,[r])}break;case"RELEASE":y=void 0;break;default:return}}catch(e){y={value:e,[s]:0}}Promise.resolve(y).catch((e=>({value:e,[s]:0}))).then((t=>{const[i,a]=m(t);r.postMessage(Object.assign(Object.assign({},i),{id:c}),a),"RELEASE"===h&&(r.removeEventListener("message",n),l(r),o in e&&"function"==typeof e[o]&&e[o]())})).catch((e=>{const[t,i]=m({value:new TypeError("Unserializable return value"),[s]:0});r.postMessage(Object.assign(Object.assign({},t),{id:c}),i)}))})),r.start&&r.start()}function l(e){(function(e){return"MessagePort"===e.constructor.name})(e)&&e.close()}function f(e){if(e)throw new Error("Proxy has been released and is not useable")}function d(e){return P(e,{type:"RELEASE"}).then((()=>{l(e)}))}const y=new WeakMap,p="FinalizationRegistry"in globalThis&&new FinalizationRegistry((e=>{const r=(y.get(e)||0)-1;y.set(e,r),0===r&&d(e)}));function g(e,r=[],t=function(){}){let i=!1;const o=new Proxy(t,{get(t,n){if(f(i),n===a)return()=>{!function(e){p&&p.unregister(e)}(o),d(e),i=!0};if("then"===n){if(0===r.length)return{then:()=>o};const t=P(e,{type:"GET",path:r.map((e=>e.toString()))}).then(b);return t.then.bind(t)}return g(e,[...r,n])},set(t,n,a){f(i);const[o,s]=m(a);return P(e,{type:"SET",path:[...r,n].map((e=>e.toString())),value:o},s).then(b)},apply(t,a,o){f(i);const s=r[r.length-1];if(s===n)return P(e,{type:"ENDPOINT"}).then(b);if("bind"===s)return g(e,r.slice(0,-1));const[c,h]=v(o);return P(e,{type:"APPLY",path:r.map((e=>e.toString())),argumentList:c},h).then(b)},construct(t,n){f(i);const[a,o]=v(n);return P(e,{type:"CONSTRUCT",path:r.map((e=>e.toString())),argumentList:a},o).then(b)}});return function(e,r){const t=(y.get(r)||0)+1;y.set(r,t),p&&p.register(e,r,e)}(o,e),o}function v(e){const r=e.map(m);return[r.map((e=>e[0])),(t=r.map((e=>e[1])),Array.prototype.concat.apply([],t))];var t}const w=new WeakMap;function m(e){for(const[r,t]of h)if(t.canHandle(e)){const[i,n]=t.serialize(e);return[{type:"HANDLER",name:r,value:i},n]}return[{type:"RAW",value:e},w.get(e)||[]]}function b(e){switch(e.type){case"HANDLER":return h.get(e.name).deserialize(e.value);case"RAW":return e.value}}function P(e,r,t){return new Promise((i=>{const n=new Array(4).fill(0).map((()=>Math.floor(Math.random()*Number.MAX_SAFE_INTEGER).toString(16))).join("-");e.addEventListener("message",(function r(t){t.data&&t.data.id&&t.data.id===n&&(e.removeEventListener("message",r),i(t.data))})),e.start&&e.start(),e.postMessage(Object.assign({id:n},r),t)}))}},495:(e,r,t)=>{t.a(e,(async(e,i)=>{try{t.d(r,{AleoKeyProvider:()=>u,AleoKeyProviderParams:()=>h,ProgramManager:()=>l});var n=t(877),a=e([n]);n=(a.then?(await a)():a)[0];async function o(e,r){const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not get URL "+e);return t}async function s(e,r){r.method="POST";const t=await fetch(e,r);if(!t.ok)throw new Error(t.status+" could not post URL "+e);return t}class c{host;headers;account;constructor(e,r){this.host=e+"/testnet",r&&r.headers?this.headers=r.headers:this.headers={"X-Aleo-SDK-Version":"0.6.12"}}setAccount(e){this.account=e}getAccount(){return this.account}setHost(e){this.host=e+"/testnet"}async fetchData(e="/"){try{const r=await o(this.host+e,{headers:this.headers});return await r.json()}catch(e){throw new Error("Error fetching data.")}}async findUnspentRecords(e,r,t,i,a,o){if(o=o||[],e<0)throw new Error("Start height must be greater than or equal to 0");const s=new Array;let c,h,u,l,f=0,d=BigInt(0);if(void 0===t){if(void 0===this.account)throw new Error("Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient");u=this.account._privateKey}else try{u=t instanceof n.ZD?t:n.ZD.from_string(t)}catch(e){throw new Error("Error parsing private key provided.")}const y=u.to_view_key();try{const e=await this.getLatestHeight();if("number"!=typeof e)throw new Error("Error fetching latest block height.");l=e}catch(e){throw new Error("Error fetching latest block height.")}if(h="number"==typeof r&&r<=l?r:l,e>h)throw new Error("Start height must be less than or equal to end height.");for(;h>e;){c=h-50,c=BigInt(a))))return s;if(void 0!==i&&i.length>0){let e=0;if(r.microcredits()>i[e]){if(e+=1,s.push(r),"number"==typeof a&&(d+=r.microcredits(),d>=BigInt(a)))return s;if(s.length>=i.length)return s}}}}}catch(e){}}}}}}}catch(e){if(console.warn("Error fetching blocks in range: "+c.toString()+"-"+h.toString()),console.warn("Error: ",e),f+=1,f>10)return console.warn("10 failures fetching records reached. Returning records fetched so far"),s}}return s}async getBlock(e){try{return await this.fetchData("/block/"+e)}catch(e){throw new Error("Error fetching block.")}}async getBlockRange(e,r){try{return await this.fetchData("/blocks?start="+e+"&end="+r)}catch(t){throw new Error("Error fetching blocks between "+e+" and "+r+".")}}async getDeploymentTransactionIDForProgram(e){e instanceof n.BP&&(e=e.toString());try{return(await this.fetchData("/find/transactionID/deployment/"+e)).replace('"',"")}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getDeploymentTransactionForProgram(e){try{const r=await this.getDeploymentTransactionIDForProgram(e);return await this.getTransaction(r)}catch(e){throw new Error("Error fetching deployment transaction for program.")}}async getLatestBlock(){try{return await this.fetchData("/latest/block")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestCommittee(){try{return await this.fetchData("/committee/latest")}catch(e){throw new Error("Error fetching latest block.")}}async getLatestHeight(){try{return await this.fetchData("/latest/height")}catch(e){throw new Error("Error fetching latest height.")}}async getProgram(e){try{return await this.fetchData("/program/"+e)}catch(e){throw new Error("Error fetching program")}}async getProgramObject(e){try{return n.BP.fromString(e)}catch(r){try{return n.BP.fromString(await this.getProgram(e))}catch(r){throw new Error(`${e} is neither a program name or a valid program`)}}}async getProgramImports(e){try{const r={},t=(e instanceof n.BP?e:await this.getProgramObject(e)).getImports();for(let e=0;e0&&!p)try{p=await this.networkClient.getProgramImports(r)}catch(e){throw E(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`)}return await n.Ao.buildExecutionTransaction(v,y,t,o,i,l,this.host,p,f,d,w,m,u)}async execute(e){const r=await this.buildExecutionTransaction(e);return await this.networkClient.submitTransaction(r)}async run(e,r,t,i,a,o,s,c,h,u){let l=h;if(void 0===h&&void 0!==this.account&&(l=this.account.privateKey()),void 0===l)throw"No private key provided and no private key set in the ProgramManager";if(!s||!c)try{[s,c]=await this.keyProvider.functionKeys(o)}catch(e){console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)}return console.log("Running program offline"),console.log("Proving key: ",s),console.log("Verifying key: ",c),n.Ao.executeFunctionOffline(l,e,r,t,i,!1,a,s,c,this.host,u)}async join(e,r,t,i,a,o,s,c){let h,u,l=s;if(void 0===s&&void 0!==this.account&&(l=this.account.privateKey()),void 0===l)throw"No private key provided and no private key set in the ProgramManager";try{h=i?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),u=await this.keyProvider.joinKeys()}catch(e){throw E(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[f,d]=h,[y,p]=u;try{o=i?await this.getCreditsRecord(t,[],o,a):void 0}catch(e){throw E(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}try{e=e instanceof n.ZF?e:n.ZF.fromString(e),r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw E("Records provided are not valid. Please ensure they are valid plaintext records.")}const g=await n.Ao.buildJoinTransaction(l,e,r,t,o,this.host,y,p,f,d,c);return await this.networkClient.submitTransaction(g)}async split(e,r,t,i){let a,o=t;if(void 0===o&&void 0!==this.account&&(o=this.account.privateKey()),void 0===o)throw"No private key provided and no private key set in the ProgramManager";try{a=await this.keyProvider.splitKeys()}catch(e){throw E(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[s,c]=a;try{r=r instanceof n.ZF?r:n.ZF.fromString(r)}catch(e){throw E("Record provided is not valid. Please ensure it is a valid plaintext record.")}const h=await n.Ao.buildSplitTransaction(o,e,r,this.host,s,c,i);return await this.networkClient.submitTransaction(h)}async synthesizeKeys(e,r,t,i){let a,o=i;void 0===o&&(o=void 0!==this.account?this.account.privateKey():new n.ZD);try{a=await this.networkClient.getProgramImports(e);const i=await n.Ao.synthesizeKeyPair(o,e,r,t,a);return[i.provingKey(),i.verifyingKey()]}catch(e){throw E(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`)}}async buildTransferTransaction(e,r,t,i,a,o,s,c,h,u){t=d(t);let l,y,p=h;if(void 0===p&&void 0!==this.account&&(p=this.account.privateKey()),void 0===p)throw"No private key provided and no private key set in the ProgramManager";try{l=a?await this.keyProvider.feePrivateKeys():await this.keyProvider.feePublicKeys(),y=await this.keyProvider.transferKeys(t)}catch(e){throw E(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`)}const[g,v]=l,[w,m]=y;try{const e=[];f(t)?(s=await this.getCreditsRecord(i,[],s,o),e.push(s.nonce())):s=void 0,c=a?await this.getCreditsRecord(i,e,c,o):void 0}catch(e){throw E(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}return await n.Ao.buildTransferTransaction(p,e,r,t,s,i,c,this.host,w,m,g,v,u)}async buildTransferPublicTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async buildTransferPublicAsSignerTransaction(e,r,t,i,n){return this.buildTransferTransaction(e,r,"public",t,!1,void 0,void 0,void 0,i,n)}async transfer(e,r,t,i,n,a,o,s,c,h){const u=await this.buildTransferTransaction(e,r,t,i,n,a,o,s,c,h);return await this.networkClient.submitTransaction(u)}async buildBondPublicTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*i),{programName:o="credits.aleo",functionName:s="bond_public",fee:c=n.fee||.86,privateFee:u=!1,inputs:l=[e,r,t,`${a.toString()}u64`],keySearchParams:f=new h({proverUri:g.bond_public.prover,verifierUri:g.bond_public.verifier,cacheKey:"credits.aleo/bond_public"}),program:d=this.creditsProgram(),...y}=n,p={programName:o,functionName:s,fee:c,privateFee:u,inputs:l,keySearchParams:f,...y};return await this.buildExecutionTransaction(p)}async bondPublic(e,r,t,i,n={}){const a=await this.buildBondPublicTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildBondValidatorTransaction(e,r,t,i,n={}){const a=Math.trunc(1e6*t),o=Math.trunc(i),{programName:s="credits.aleo",functionName:c="bond_validator",fee:u=n.fee||.86,privateFee:l=!1,inputs:f=[e,r,`${a.toString()}u64`,`${o.toString()}u8`],keySearchParams:d=new h({proverUri:g.bond_validator.prover,verifierUri:g.bond_validator.verifier,cacheKey:"credits.aleo/bond_validator"}),program:y=this.creditsProgram(),...p}=n,v={programName:s,functionName:c,fee:u,privateFee:l,inputs:f,keySearchParams:d,...p};return await this.buildExecutionTransaction(v)}async bondValidator(e,r,t,i,n={}){const a=await this.buildBondValidatorTransaction(e,r,t,i,n);return await this.networkClient.submitTransaction(a)}async buildUnbondPublicTransaction(e,r,t={}){const i=Math.trunc(1e6*r),{programName:n="credits.aleo",functionName:a="unbond_public",fee:o=t.fee||1.3,privateFee:s=!1,inputs:c=[e,`${i.toString()}u64`],keySearchParams:u=new h({proverUri:g.unbond_public.prover,verifierUri:g.unbond_public.verifier,cacheKey:"credits.aleo/unbond_public"}),program:l=this.creditsProgram(),...f}=t,d={programName:n,functionName:a,fee:o,privateFee:s,inputs:c,keySearchParams:u,...f};return this.buildExecutionTransaction(d)}async unbondPublic(e,r,t={}){const i=await this.buildUnbondPublicTransaction(e,r,t);return await this.networkClient.submitTransaction(i)}async buildClaimUnbondPublicTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="claim_unbond_public",fee:n=r.fee||2,privateFee:a=!1,inputs:o=[e],keySearchParams:s=new h({proverUri:g.claim_unbond_public.prover,verifierUri:g.claim_unbond_public.verifier,cacheKey:"credits.aleo/claim_unbond_public"}),program:c=this.creditsProgram(),...u}=r,l={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...u};return await this.buildExecutionTransaction(l)}async claimUnbondPublic(e,r={}){const t=await this.buildClaimUnbondPublicTransaction(e,r);return await this.networkClient.submitTransaction(t)}async buildSetValidatorStateTransaction(e,r={}){const{programName:t="credits.aleo",functionName:i="set_validator_state",fee:n=1,privateFee:a=!1,inputs:o=[e.toString()],keySearchParams:s=new h({proverUri:g.set_validator_state.prover,verifierUri:g.set_validator_state.verifier,cacheKey:"credits.aleo/set_validator_state"}),...c}=r,u={programName:t,functionName:i,fee:n,privateFee:a,inputs:o,keySearchParams:s,...c};return await this.execute(u)}async setValidatorState(e,r={}){const t=await this.buildSetValidatorStateTransaction(e,r);return this.networkClient.submitTransaction(t)}verifyExecution(e){try{const r=e.getExecution(),t=e.getFunctionId(),i=e.getProgram(),a=e.getVerifyingKey();return(0,n.Yc)(r,a,i,t)}catch(e){return console.warn("The execution was not found in the response, cannot verify the execution"),!1}}createProgramFromSource(e){return n.BP.fromString(e)}creditsProgram(){return n.BP.getCreditsProgram()}verifyProgram(e){try{return n.BP.fromString(e),!0}catch(e){return!1}}async getCreditsRecord(e,r,t,i){try{return t instanceof n.ZF?t:n.ZF.fromString(t)}catch(t){try{const t=this.recordProvider;return await t.findCreditsRecord(e,!0,r,i)}catch(e){throw E(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`)}}}}function f(e){return v.has(e)}function d(e){return w.has(e)?e:E(`Invalid transfer type '${e}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`)}const y=n.OS.baseUrl();function p(e){const r=n.pF[e.verifyingKey];if(!r)throw new Error("Invalid method name: "+e.verifyingKey);return{name:e.name,locator:e.locator,prover:e.prover,verifier:e.verifier,verifyingKey:r}}const g={bond_public:p(n.OS.bond_public()),bond_validator:p(n.OS.bond_validator()),claim_unbond_public:p(n.OS.claim_unbond_public()),fee_private:p(n.OS.fee_private()),fee_public:p(n.OS.fee_public()),inclusion:p(n.OS.inclusion()),join:p(n.OS.join()),set_validator_state:p(n.OS.set_validator_state()),split:p(n.OS.split()),transfer_private:p(n.OS.transfer_private()),transfer_private_to_public:p(n.OS.transfer_private_to_public()),transfer_public:p(n.OS.transfer_public()),transfer_public_as_signer:p(n.OS.transfer_public_as_signer()),transfer_public_to_private:p(n.OS.transfer_public_to_private()),unbond_public:p(n.OS.unbond_public()),getKey:function(e){return this.hasOwnProperty(e)?this[e]:new Error(`Key "${e}" not found.`)}},v=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic"]),w=new Set(["transfer_private","private","transferPrivate","transfer_private_to_public","privateToPublic","transferPrivateToPublic","transfer_public","transfer_public_as_signer","public","public_as_signer","transferPublic","transferPublicAsSigner","transfer_public_to_private","publicToPrivate","publicAsSigner","transferPublicToPrivate"]),m=new Set(["private","transfer_private","transferPrivate"]),b=new Set(["private_to_public","privateToPublic","transfer_private_to_public","transferPrivateToPublic"]),P=new Set(["public","transfer_public","transferPublic"]),_=new Set(["public_as_signer","transfer_public_as_signer","transferPublicAsSigner"]),k=new Set(["public_to_private","publicToPrivate","transfer_public_to_private","transferPublicToPrivate"]);function E(e){throw console.error(e),e}i()}catch(K){i(K)}}))},341:(e,r,t)=>{t.a(e,(async(e,r)=>{try{var i=t(495),n=t(720),a=t(877),o=e([i,a]);[i,a]=o.then?(await o)():o,await(0,a.Fs)();const s="https://api.explorer.aleo.org/v1",c=new i.AleoKeyProvider,h=new i.ProgramManager(s,c,void 0);c.useCache(!0);let u="";async function l(e,r,t,n,o=!1){console.log("Web worker: Executing function locally...");const s=performance.now();try{const l=h.createProgramFromSource(e);if(l instanceof Error)throw"Error creating program from source";const f=l.id();if(!l.hasFunction(r))throw`Program ${f} does not contain function ${r}`;const d=`${f}:${r}`,y=await h.networkClient.getProgramImports(e);if(y instanceof Error)throw"Error getting program imports";if(u!==e){const i=await h.synthesizeKeys(e,r,t,a.ZD.from_string(n));h.keyProvider.cacheKeys(d,i),u=e}const p=new i.AleoKeyProviderParams({cacheKey:d}),g=await h.run(e,r,t,o,y,p,void 0,void 0,a.ZD.from_string(n));console.log(`Web worker: Local execution completed in ${performance.now()-s} ms`);const v=g.getOutputs(),w=g.getExecution();let m="";const b=c.getKeys(d);if(b instanceof Error)throw"Could not get verifying key";const P=b[1];return w?((0,a.Yc)(w,P,l,"hello"),m=w.toString(),console.log("Execution verified successfully: "+w)):m="",console.log(`Function execution response: ${v}`),{outputs:v,execution:m}}catch(e){return console.error(e),e?e.toString():"Unknown error"}}async function f(){return(new a.ZD).to_string()}const d={run:l,getPrivateKey:f};(0,n.p)(d),r()}catch(y){r(y)}}),1)}}]); +//# sourceMappingURL=907.bundle.js.map \ No newline at end of file diff --git a/907.bundle.js.LICENSE.txt b/907.bundle.js.LICENSE.txt new file mode 100644 index 000000000..479a8e58b --- /dev/null +++ b/907.bundle.js.LICENSE.txt @@ -0,0 +1,5 @@ +/** + * @license + * Copyright 2019 Google LLC + * SPDX-License-Identifier: Apache-2.0 + */ diff --git a/907.bundle.js.map b/907.bundle.js.map new file mode 100644 index 000000000..7bbe338aa --- /dev/null +++ b/907.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"907.bundle.js","mappings":";sHAKA,MAAMA,EAAcC,OAAO,iBACrBC,EAAiBD,OAAO,oBACxBE,EAAeF,OAAO,wBACtBG,EAAYH,OAAO,qBACnBI,EAAcJ,OAAO,kBACrBK,EAAYC,GAAwB,iBAARA,GAA4B,OAARA,GAAgC,mBAARA,EAgDxEC,EAAmB,IAAIC,IAAI,CAC7B,CAAC,QA7CwB,CACzBC,UAAYH,GAAQD,EAASC,IAAQA,EAAIP,GACzC,SAAAW,CAAUC,GACN,MAAM,MAAEC,EAAK,MAAEC,GAAU,IAAIC,eAE7B,OADAC,EAAOJ,EAAKC,GACL,CAACC,EAAO,CAACA,GACpB,EACA,WAAAG,CAAYC,GAER,OADAA,EAAKC,QAiJFC,EAhJSF,EAgJO,GAAIG,GAD/B,IAAkBA,CA9Id,IAoCA,CAAC,QA/BwB,CACzBX,UAAYY,GAAUhB,EAASgB,IAAUjB,KAAeiB,EACxD,SAAAX,EAAU,MAAEW,IACR,IAAIC,EAcJ,OAZIA,EADAD,aAAiBE,MACJ,CACTC,SAAS,EACTH,MAAO,CACHI,QAASJ,EAAMI,QACfC,KAAML,EAAMK,KACZC,MAAON,EAAMM,QAKR,CAAEH,SAAS,EAAOH,SAE5B,CAACC,EAAY,GACxB,EACA,WAAAN,CAAYM,GACR,GAAIA,EAAWE,QACX,MAAMI,OAAOC,OAAO,IAAIN,MAAMD,EAAWD,MAAMI,SAAUH,EAAWD,OAExE,MAAMC,EAAWD,KACrB,MAoBJ,SAASN,EAAOJ,EAAKmB,EAAKC,WAAYC,EAAiB,CAAC,MACpDF,EAAGG,iBAAiB,WAAW,SAASC,EAASC,GAC7C,IAAKA,IAAOA,EAAGC,KACX,OAEJ,IAhBR,SAAyBJ,EAAgBK,GACrC,IAAK,MAAMC,KAAiBN,EAAgB,CACxC,GAAIK,IAAWC,GAAmC,MAAlBA,EAC5B,OAAO,EAEX,GAAIA,aAAyBC,QAAUD,EAAcE,KAAKH,GACtD,OAAO,CAEf,CACA,OAAO,CACX,CAMaI,CAAgBT,EAAgBG,EAAGE,QAEpC,YADAK,QAAQC,KAAK,mBAAmBR,EAAGE,6BAGvC,MAAM,GAAEO,EAAE,KAAEC,EAAI,KAAEC,GAASlB,OAAOC,OAAO,CAAEiB,KAAM,IAAMX,EAAGC,MACpDW,GAAgBZ,EAAGC,KAAKW,cAAgB,IAAIC,IAAIC,GACtD,IAAIC,EACJ,IACI,MAAMC,EAASL,EAAKM,MAAM,GAAI,GAAGC,QAAO,CAAC1C,EAAK2C,IAAS3C,EAAI2C,IAAO3C,GAC5D4C,EAAWT,EAAKO,QAAO,CAAC1C,EAAK2C,IAAS3C,EAAI2C,IAAO3C,GACvD,OAAQkC,GACJ,IAAK,MAEGK,EAAcK,EAElB,MACJ,IAAK,MAEGJ,EAAOL,EAAKM,OAAO,GAAG,IAAMH,EAAcd,EAAGC,KAAKf,OAClD6B,GAAc,EAElB,MACJ,IAAK,QAEGA,EAAcK,EAASC,MAAML,EAAQJ,GAEzC,MACJ,IAAK,YAGGG,EA6KxB,SAAevC,GACX,OAAOiB,OAAOC,OAAOlB,EAAK,CAAE,CAACZ,IAAc,GAC/C,CA/KsC0D,CADA,IAAIF,KAAYR,IAGlC,MACJ,IAAK,WACD,CACI,MAAM,MAAEnC,EAAK,MAAEC,GAAU,IAAIC,eAC7BC,EAAOJ,EAAKE,GACZqC,EAkKxB,SAAkBvC,EAAK+C,GAEnB,OADAC,EAAcC,IAAIjD,EAAK+C,GAChB/C,CACX,CArKsCkD,CAASjD,EAAO,CAACA,GACnC,CACA,MACJ,IAAK,UAEGsC,OAAcY,EAElB,MACJ,QACI,OAEZ,CACA,MAAOzC,GACH6B,EAAc,CAAE7B,QAAO,CAACjB,GAAc,EAC1C,CACA2D,QAAQC,QAAQd,GACXe,OAAO5C,IACD,CAAEA,QAAO,CAACjB,GAAc,MAE9B8D,MAAMhB,IACP,MAAOiB,EAAWC,GAAiBC,EAAYnB,GAC/CpB,EAAGwC,YAAY1C,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGsC,GAAY,CAAEvB,OAAOwB,GACvD,YAATvB,IAEAf,EAAGyC,oBAAoB,UAAWrC,GAClCsC,EAAc1C,GACV3B,KAAaQ,GAAiC,mBAAnBA,EAAIR,IAC/BQ,EAAIR,KAEZ,IAEC8D,OAAOQ,IAER,MAAON,EAAWC,GAAiBC,EAAY,CAC3ChD,MAAO,IAAIqD,UAAU,+BACrB,CAACtE,GAAc,IAEnB0B,EAAGwC,YAAY1C,OAAOC,OAAOD,OAAOC,OAAO,CAAC,EAAGsC,GAAY,CAAEvB,OAAOwB,EAAc,GAE1F,IACItC,EAAGZ,OACHY,EAAGZ,OAEX,CAIA,SAASsD,EAAcG,IAHvB,SAAuBA,GACnB,MAAqC,gBAA9BA,EAASC,YAAYlD,IAChC,EAEQmD,CAAcF,IACdA,EAASG,OACjB,CAIA,SAASC,EAAqBC,GAC1B,GAAIA,EACA,MAAM,IAAIzD,MAAM,6CAExB,CACA,SAAS0D,EAAgBnD,GACrB,OAAOoD,EAAuBpD,EAAI,CAC9Be,KAAM,YACPqB,MAAK,KACJM,EAAc1C,EAAG,GAEzB,CACA,MAAMqD,EAAe,IAAIC,QACnBC,EAAkB,yBAA0BtD,YAC9C,IAAIuD,sBAAsBxD,IACtB,MAAMyD,GAAYJ,EAAaK,IAAI1D,IAAO,GAAK,EAC/CqD,EAAavB,IAAI9B,EAAIyD,GACJ,IAAbA,GACAN,EAAgBnD,EACpB,IAcR,SAASX,EAAYW,EAAIgB,EAAO,GAAI1B,EAAS,WAAc,GACvD,IAAIqE,GAAkB,EACtB,MAAMhC,EAAQ,IAAIiC,MAAMtE,EAAQ,CAC5B,GAAAoE,CAAIG,EAASrC,GAET,GADAyB,EAAqBU,GACjBnC,IAASpD,EACT,MAAO,MAXvB,SAAyBuD,GACjB4B,GACAA,EAAgBO,WAAWnC,EAEnC,CAQoBoC,CAAgBpC,GAChBwB,EAAgBnD,GAChB2D,GAAkB,CAAI,EAG9B,GAAa,SAATnC,EAAiB,CACjB,GAAoB,IAAhBR,EAAKgD,OACL,MAAO,CAAE5B,KAAM,IAAMT,GAEzB,MAAMsC,EAAIb,EAAuBpD,EAAI,CACjCe,KAAM,MACNC,KAAMA,EAAKE,KAAKgD,GAAMA,EAAEC,eACzB/B,KAAKjB,GACR,OAAO8C,EAAE7B,KAAKgC,KAAKH,EACvB,CACA,OAAO5E,EAAYW,EAAI,IAAIgB,EAAMQ,GACrC,EACA,GAAAM,CAAI+B,EAASrC,EAAMC,GACfwB,EAAqBU,GAGrB,MAAOpE,EAAO+C,GAAiBC,EAAYd,GAC3C,OAAO2B,EAAuBpD,EAAI,CAC9Be,KAAM,MACNC,KAAM,IAAIA,EAAMQ,GAAMN,KAAKgD,GAAMA,EAAEC,aACnC5E,SACD+C,GAAeF,KAAKjB,EAC3B,EACA,KAAAO,CAAMmC,EAASQ,EAAUC,GACrBrB,EAAqBU,GACrB,MAAMY,EAAOvD,EAAKA,EAAKgD,OAAS,GAChC,GAAIO,IAASpG,EACT,OAAOiF,EAAuBpD,EAAI,CAC9Be,KAAM,aACPqB,KAAKjB,GAGZ,GAAa,SAAToD,EACA,OAAOlF,EAAYW,EAAIgB,EAAKM,MAAM,GAAI,IAE1C,MAAOL,EAAcqB,GAAiBkC,EAAiBF,GACvD,OAAOlB,EAAuBpD,EAAI,CAC9Be,KAAM,QACNC,KAAMA,EAAKE,KAAKgD,GAAMA,EAAEC,aACxBlD,gBACDqB,GAAeF,KAAKjB,EAC3B,EACA,SAAAsD,CAAUZ,EAASS,GACfrB,EAAqBU,GACrB,MAAO1C,EAAcqB,GAAiBkC,EAAiBF,GACvD,OAAOlB,EAAuBpD,EAAI,CAC9Be,KAAM,YACNC,KAAMA,EAAKE,KAAKgD,GAAMA,EAAEC,aACxBlD,gBACDqB,GAAeF,KAAKjB,EAC3B,IAGJ,OA7EJ,SAAuBQ,EAAO3B,GAC1B,MAAMyD,GAAYJ,EAAaK,IAAI1D,IAAO,GAAK,EAC/CqD,EAAavB,IAAI9B,EAAIyD,GACjBF,GACAA,EAAgBmB,SAAS/C,EAAO3B,EAAI2B,EAE5C,CAsEIgD,CAAchD,EAAO3B,GACd2B,CACX,CAIA,SAAS6C,EAAiBvD,GACtB,MAAM2D,EAAY3D,EAAaC,IAAIqB,GACnC,MAAO,CAACqC,EAAU1D,KAAK2D,GAAMA,EAAE,MALnBC,EAK+BF,EAAU1D,KAAK2D,GAAMA,EAAE,KAJ3DE,MAAMC,UAAUC,OAAOvD,MAAM,GAAIoD,KAD5C,IAAgBA,CAMhB,CACA,MAAMjD,EAAgB,IAAIyB,QAe1B,SAASf,EAAYhD,GACjB,IAAK,MAAOK,EAAMsF,KAAYzG,EAC1B,GAAIyG,EAAQvG,UAAUY,GAAQ,CAC1B,MAAO4F,EAAiB7C,GAAiB4C,EAAQtG,UAAUW,GAC3D,MAAO,CACH,CACIwB,KAAM,UACNnB,OACAL,MAAO4F,GAEX7C,EAER,CAEJ,MAAO,CACH,CACIvB,KAAM,MACNxB,SAEJsC,EAAc6B,IAAInE,IAAU,GAEpC,CACA,SAAS4B,EAAc5B,GACnB,OAAQA,EAAMwB,MACV,IAAK,UACD,OAAOtC,EAAiBiF,IAAInE,EAAMK,MAAMV,YAAYK,EAAMA,OAC9D,IAAK,MACD,OAAOA,EAAMA,MAEzB,CACA,SAAS6D,EAAuBpD,EAAIoF,EAAKxD,GACrC,OAAO,IAAIK,SAASC,IAChB,MAAMpB,EAeH,IAAIiE,MAAM,GACZM,KAAK,GACLnE,KAAI,IAAMoE,KAAKC,MAAMD,KAAKE,SAAWC,OAAOC,kBAAkBvB,SAAS,MACvEwB,KAAK,KAjBN3F,EAAGG,iBAAiB,WAAW,SAASyF,EAAEvF,GACjCA,EAAGC,MAASD,EAAGC,KAAKQ,IAAMT,EAAGC,KAAKQ,KAAOA,IAG9Cd,EAAGyC,oBAAoB,UAAWmD,GAClC1D,EAAQ7B,EAAGC,MACf,IACIN,EAAGZ,OACHY,EAAGZ,QAEPY,EAAGwC,YAAY1C,OAAOC,OAAO,CAAEe,MAAMsE,GAAMxD,EAAU,GAE7D,2KChVOiE,eAAenC,EAAIoC,EAAmBC,GACzC,MAAMC,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIzG,MAAMuG,EAASG,OAAS,sBAAwBL,GAG9D,OAAOE,CACX,CAGOH,eAAeO,EAAKN,EAAmBC,GAC1CA,EAAQM,OAAS,OAEjB,MAAML,QAAiBC,MAAMH,EAAKC,GAElC,IAAKC,EAASE,GACV,MAAM,IAAIzG,MAAMuG,EAASG,OAAS,uBAAyBL,GAG/D,OAAOE,CACX,CCUA,MAAMM,EACJC,KACAC,QACAC,QAEA3D,WAAAA,CAAYyD,EAAcR,GACxBW,KAAKH,KAAOA,EAAO,WAEfR,GAAWA,EAAQS,QACrBE,KAAKF,QAAUT,EAAQS,QAGvBE,KAAKF,QAAU,CAEb,qBAAsB,UAa5BG,UAAAA,CAAWF,GACTC,KAAKD,QAAUA,EASjBG,UAAAA,GACE,OAAOF,KAAKD,QASdI,OAAAA,CAAQN,GACNG,KAAKH,KAAOA,EAAO,WAGrB,eAAMO,CACFhB,EAAM,KAER,IACA,MAAME,QAAiBtC,EAAIgD,KAAKH,KAAOT,EAAK,CAC1CU,QAASE,KAAKF,UAGhB,aAAaR,EAASe,MACrB,CAAC,MAAOpE,GACP,MAAM,IAAIlD,MAAM,uBACjB,EA0BH,wBAAMuH,CACFC,EACAC,EACAC,EACAC,EACAC,EACAC,GAIF,GAFAA,EAASA,GAAU,GAEfL,EAAc,EAChB,MAAM,IAAIxH,MAAM,mDAIlB,MAAM8H,EAAU,IAAIxC,MACpB,IAAI3F,EACAoI,EACAC,EAGAC,EAFAC,EAAW,EACXC,EAAmBC,OAAO,GAI9B,QAA0B,IAAfV,EAA4B,CACrC,QAA4B,IAAjBT,KAAKD,QACd,MAAM,IAAIhH,MAAM,oGAEhBgI,EAAqBf,KAAKD,QAAQqB,WAErC,MACC,IACEL,EAAqBN,aAAsBY,EAAAA,GAAaZ,EAAaY,EAAAA,GAAWC,YAAYb,EAC7F,CAAC,MAAOxE,GACP,MAAM,IAAIlD,MAAM,sCACjB,CAEH,MAAMwI,EAAUR,EAAmBS,cAGnC,IACE,MAAMC,QAAoBzB,KAAK0B,kBAC/B,GAA2B,iBAAhBD,EAGT,MAAM,IAAI1I,MAAM,uCAFhBiI,EAAeS,CAIlB,CAAC,MAAOxF,GACP,MAAM,IAAIlD,MAAM,sCACjB,CAUD,GANE+H,EADuB,iBAAdN,GAA0BA,GAAaQ,EAC1CR,EAEAQ,EAIJT,EAAcO,EAChB,MAAM,IAAI/H,MAAM,0DAIlB,KAAO+H,EAAMP,GAAa,CACxB7H,EAAQoI,EAAM,GACVpI,EAAQ6H,IACV7H,EAAQ6H,GAEV,IAEE,MAAMoB,QAAe3B,KAAK4B,cAAclJ,EAAOoI,GAE/C,GADAA,EAAMpI,IACAiJ,aAAkB5I,OAEtB,IAAK,IAAI8I,EAAI,EAAGA,EAAIF,EAAOrE,OAAQuE,IAAK,CACtC,MACMC,EADQH,EAAOE,GACMC,aAC3B,QAA8B,IAAjBA,EACX,IAAK,IAAIC,EAAI,EAAGA,EAAID,EAAaxE,OAAQyE,IAAK,CAC5C,MAAMC,EAAuBF,EAAaC,GAE1C,GAAiC,WAA7BC,EAAqB3H,KAAmB,CAC1C,MAAM4H,EAAcD,EAAqBC,YACzC,GAAIA,EAAYC,gBAA2D,IAArCD,EAAYC,UAAUC,YAC1D,IAAK,IAAIC,EAAI,EAAGA,EAAIH,EAAYC,UAAUC,YAAY7E,OAAQ8E,IAAK,CACjE,MAAMC,EAAaJ,EAAYC,UAAUC,YAAYC,GAErD,GAA2B,iBAAvBC,EAAWC,cAGoB,IAAtBD,EAAWE,QACtB,IAAK,IAAIrD,EAAI,EAAGA,EAAImD,EAAWE,QAAQjF,OAAQ4B,IAAK,CAClD,MAAMsD,EAASH,EAAWE,QAAQrD,GAClC,GAAoB,WAAhBsD,EAAOnI,KACT,IAEE,MAAMoI,EAASC,EAAAA,GAAiBC,WAAWH,EAAO3J,OAElD,GAAI4J,EAAOG,QAAQrB,GAAU,CAE3B,MAAMsB,EAAkBJ,EAAOK,QAAQvB,GAGjCwB,EAAQF,EAAgBE,QAC9B,GAAInC,EAAOoC,SAASD,GAClB,SAIF,MAAME,EAAeJ,EAAgBK,mBAAmBnC,EAAoB,eAAgB,WAE5F,UACQf,KAAKmD,gBAAgBF,EAC5B,CAAC,MAAOhH,GAEP,IAAKyE,IACHG,EAAQuC,KAAKP,GAEkB,iBAApBlC,IACTO,GAAoB2B,EAAgBQ,eAEhCnC,GAAoBC,OAAOR,KAC7B,OAAOE,EAKb,QAAyB,IAAZH,GAA4BA,EAAQpD,OAAS,EAAG,CAC3D,IAAIgG,EAAgB,EACpB,GAAIT,EAAgBQ,eAAiB3C,EAAQ4C,GAAgB,CAIzD,GAHAA,GAAiB,EACjBzC,EAAQuC,KAAKP,GAEkB,iBAApBlC,IACTO,GAAoB2B,EAAgBQ,eAEhCnC,GAAoBC,OAAOR,IAC7B,OAAOE,EAGX,GAAIA,EAAQvD,QAAUoD,EAAQpD,OAC5B,OAAOuD,CAEZ,CACF,CACF,CACF,CACF,CAAC,MAAO5E,GACR,CAEJ,CAEJ,CAEJ,CACF,CAEJ,CAEJ,CAAC,MAAOA,GAKP,GAHA/B,QAAQC,KAAK,mCAAqCzB,EAAM+E,WAAa,IAAMqD,EAAIrD,YAC/EvD,QAAQC,KAAK,UAAW8B,GACxBgF,GAAY,EACRA,EAAW,GAEb,OADA/G,QAAQC,KAAK,0EACN0G,CAEV,CACF,CACD,OAAOA,EAUT,cAAM0C,CAASC,GACb,IAEE,aADoBxD,KAAKI,UAAiB,UAAYoD,EAEvD,CAAC,MAAOvH,GACP,MAAM,IAAIlD,MAAM,wBACjB,EAWH,mBAAM6I,CAAclJ,EAAeoI,GACjC,IACE,aAAad,KAAKI,UAAwB,iBAAmB1H,EAAQ,QAAUoI,EAChF,CAAC,MAAO7E,GAEP,MAAM,IAAIlD,MADW,iCAAmCL,EAAQ,QAAUoI,EAAM,IAEjF,EASH,0CAAM2C,CAAqCnB,GACrCA,aAAmBoB,EAAAA,KACrBpB,EAAUA,EAAQ7E,YAEpB,IAEE,aADiBuC,KAAKI,UAAkB,kCAAoCkC,IAClEqB,QAAQ,IAAM,GACzB,CAAC,MAAO1H,GACP,MAAM,IAAIlD,MAAM,qDACjB,EASH,wCAAM6K,CAAmCtB,GACvC,IACE,MAAMuB,QAA+B7D,KAAKyD,qCAAqCnB,GAC/E,aAA+BtC,KAAK8D,eAAeD,EACpD,CAAC,MAAO5H,GACP,MAAM,IAAIlD,MAAM,qDACjB,EASH,oBAAMgL,GACJ,IACE,aAAa/D,KAAKI,UAAiB,gBACpC,CAAC,MAAOnE,GACP,MAAM,IAAIlD,MAAM,+BACjB,EAQH,wBAAMiL,GACJ,IACE,aAAahE,KAAKI,UAAkB,oBACrC,CAAC,MAAOnE,GACP,MAAM,IAAIlD,MAAM,+BACjB,EASH,qBAAM2I,GACJ,IACE,aAAa1B,KAAKI,UAAkB,iBACrC,CAAC,MAAOnE,GACP,MAAM,IAAIlD,MAAM,gCACjB,EAcH,gBAAMkL,CAAWC,GACf,IACE,aAAalE,KAAKI,UAAkB,YAAc8D,EACnD,CAAC,MAAOjI,GACP,MAAM,IAAIlD,MAAM,yBACjB,EAoBH,sBAAMoL,CAAiBC,GACrB,IACE,OAAOV,EAAAA,GAAQf,WAAWyB,EAC3B,CAAC,MAAOnI,GACP,IACE,OAAOyH,EAAAA,GAAQf,iBAA0B3C,KAAKiE,WAAWG,GAC1D,CAAC,MAAOnI,GACP,MAAM,IAAIlD,MAAM,GAAGqL,iDACpB,CACF,EA4BH,uBAAMC,CAAkBD,GACtB,IACE,MAAME,EAA0B,CAAC,EAM3BC,GAHUH,aAAwBV,EAAAA,GAAUU,QAA+BpE,KAAKmE,iBAAiBC,IAG5EI,aAG3B,IAAK,IAAI3C,EAAI,EAAGA,EAAI0C,EAAWjH,OAAQuE,IAAK,CAC1C,MAAM4C,EAAYF,EAAW1C,GAC7B,IAAKyC,EAAQI,eAAeD,GAAY,CACtC,MAAME,QAA8B3E,KAAKiE,WAAWQ,GAC9CG,QAAsC5E,KAAKqE,kBAAkBI,GACnE,IAAK,MAAMI,KAAOD,EACXN,EAAQI,eAAeG,KAC1BP,EAAQO,GAAOD,EAAcC,IAGjCP,EAAQG,GAAaE,CACtB,CACF,CACD,OAAOL,CACR,CAAC,MAAOrI,GACP,MAAM6I,EAAY,mCAAqC7I,EACxD,EAcH,2BAAM8I,CAAsBX,GAC1B,IAEE,OADgBA,aAAwBV,EAAAA,GAAUU,QAA+BpE,KAAKmE,iBAAiBC,IACxFI,YAChB,CAAC,MAAOvI,GACP,MAAM,IAAIlD,MAAM,8CAAgDkD,EACjE,EAYH,4BAAM+I,CAAuBd,GAC3B,IACE,aAAalE,KAAKI,UAAyB,YAAc8D,EAAY,YACtE,CAAC,MAAOjI,GACP,MAAM,IAAIlD,MAAM,2FACjB,EAiBH,4BAAMkM,CAAuBf,EAAmBgB,EAAqBL,GACnE,IACE,aAAa7E,KAAKI,UAAkB,YAAc8D,EAAY,YAAcgB,EAAc,IAAML,EACjG,CAAC,MAAO5I,GACP,MAAM,IAAIlD,MAAM,kFACjB,EASH,kBAAMoM,GACJ,IACE,aAAanF,KAAKI,UAAkB,oBACrC,CAAC,MAAOnE,GACP,MAAM,IAAIlD,MAAM,iCACjB,EAUH,oBAAM+K,CAAe1J,GACnB,IACA,aAAa4F,KAAKI,UAA4B,gBAAkBhG,EAC/D,CAAC,MAAO6B,GACP,MAAM,IAAIlD,MAAM,8BACjB,EAUH,qBAAMqM,CAAgB5B,GACpB,IACA,aAAaxD,KAAKI,UAAmC,UAAYoD,EAAO/F,WAAa,gBACpF,CAAC,MAAOxB,GACP,MAAM,IAAIlD,MAAM,+BACjB,EASH,8BAAMsM,GACJ,IACE,aAAarF,KAAKI,UAAmC,2BACtD,CAAC,MAAOnE,GACP,MAAM,IAAIlD,MAAM,4CACjB,EAUH,qBAAMoK,CAAgBmC,GACpB,IACE,aAAatF,KAAKI,UAAkB,sBAAwBkF,EAC7D,CAAC,MAAOrJ,GACP,MAAM,IAAIlD,MAAM,gCACjB,EASH,uBAAMwM,CAAkBtD,GACtB,MAAMuD,EAAqBvD,aAAuBwD,EAAAA,GAAcxD,EAAYxE,WAAawE,EACzF,IACE,MAAM3C,QAAiBI,EAAKM,KAAKH,KAAO,yBAA0B,CAChE6F,KAAMF,EACN1F,QAAS1G,OAAOC,OAAO,CAAC,EAAG2G,KAAKF,QAAS,CACvC,eAAgB,uBAIpB,IACE,aAAaR,EAASe,MAEvB,CAAC,MAAOpE,GACP,MAAM,IAAIlD,MAAM,qDAAsDkD,EAAgBhD,UACvF,CACF,CAAC,MAAOgD,GACP,MAAM,IAAIlD,MAAM,oDAAqDkD,EAAgBhD,UACtF,GCjnBL,MAAM0M,EACFzM,KACA0M,UACAC,YACAC,SAUA1J,WAAAA,CAAY2J,GACR/F,KAAK4F,UAAYG,EAAOH,UACxB5F,KAAK6F,YAAcE,EAAOF,YAC1B7F,KAAK8F,SAAWC,EAAOD,SACvB9F,KAAK9G,KAAO6M,EAAO7M,MAyK3B,MAAM8M,EACFC,MACAC,YACAC,QAEA,gBAAMC,CACFhH,EAAM,KAEN,IACA,MAAME,QAAiBtC,EAAIoC,GACrBxF,QAAa0F,EAAS+G,cAC5B,OAAO,IAAIC,WAAW1M,EACrB,CAAC,MAAOqC,GACL,MAAM,IAAIlD,MAAM,uBAAyBkD,EAC5C,EAGLG,WAAAA,GACI4D,KAAKmG,QAAUI,EACfvG,KAAKiG,MAAQ,IAAIjO,IACjBgI,KAAKkG,aAAc,EAQvBM,QAAAA,CAASA,GACLxG,KAAKkG,YAAcM,EAMvBC,UAAAA,GACIzG,KAAKiG,MAAMS,QAUfC,SAAAA,CAAUC,EAAeC,GACrB,MAAOC,EAAYC,GAAgBF,EACnC7G,KAAKiG,MAAM7K,IAAIwL,EAAO,CAACE,EAAWE,UAAWD,EAAaC,YAS9DC,YAAAA,CAAaL,GACT,OAAO5G,KAAKiG,MAAMiB,IAAIN,GAS1BO,UAAAA,CAAWP,GACP,OAAO5G,KAAKiG,MAAMmB,OAAOR,GAS7BS,OAAAA,CAAQT,GAEJ,GADA1M,QAAQoN,MAAM,2CAA2CV,KACrD5G,KAAKiG,MAAMiB,IAAIN,GAAQ,CACvB,MAAOW,EAAiBC,GAAoCxH,KAAKiG,MAAMjJ,IAAI4J,GAC3E,MAAO,CAACa,EAAAA,GAAWC,UAAUH,GAAkBI,EAAAA,GAAaD,UAAUF,GACzE,CACG,OAAO,IAAIzO,MAAM,2BAwBzB,kBAAM6O,CAAa7B,GACf,GAAIA,EAAQ,CACR,IAAI8B,EACAC,EACAhC,EACJ,GAAI,SAAUC,GAAmC,iBAAlBA,EAAa,KAAe,CACvD,IAAIlB,EAAMkD,EAAqBC,OAAOjC,EAAa,MACnD,KAAMlB,aAAe9L,OACjB,OAAOiH,KAAKiI,iBAAiBpD,EAEpC,CAcD,GAZI,cAAekB,GAAwC,iBAAvBA,EAAkB,YAClD8B,EAAY9B,EAAkB,WAG9B,gBAAiBA,GAA0C,iBAAzBA,EAAoB,cACtD+B,EAAc/B,EAAoB,aAGlC,aAAcA,GAAuC,iBAAtBA,EAAiB,WAChDD,EAAWC,EAAiB,UAG5B8B,GAAaC,EACb,aAAa9H,KAAKkI,gBAAgBL,EAAWC,EAAahC,GAG9D,GAAIA,EACA,OAAO9F,KAAKqH,QAAQvB,EAE3B,CACD,MAAM/M,MAAM,oGA4BhB,qBAAMmP,CAAgBL,EAAmBC,EAAqBhC,GAC1D,IAEI,GAAI9F,KAAKkG,YAAa,CACbJ,IACDA,EAAW+B,GAEf,MAAMhP,EAAQmH,KAAKiG,MAAMjJ,IAAI8I,GAC7B,QAAqB,IAAVjN,EACP,MAAO,CAAC4O,EAAAA,GAAWC,UAAU7O,EAAM,IAAK8O,EAAAA,GAAaD,UAAU7O,EAAM,KAClE,CACHqB,QAAQoN,MAAM,kCAAoCO,GAClD,MAAMf,EAAyBW,EAAAA,GAAWC,gBAAgB1H,KAAKoG,WAAWyB,IAC1E3N,QAAQoN,MAAM,2BAA6BQ,GAC3C,MAAMf,QAAoC/G,KAAKmI,gBAAgBL,GAE/D,OADA9H,KAAKiG,MAAM7K,IAAI0K,EAAU,CAACgB,EAAWE,UAAWD,EAAaC,YACtD,CAACF,EAAYC,EACvB,CACJ,CACI,CAED,MAAMD,EAAyBW,EAAAA,GAAWC,gBAAgB1H,KAAKoG,WAAWyB,IAE1E,MAAO,CAACf,QADkC9G,KAAKmI,gBAAgBL,GAElE,CACJ,CAAC,MAAO7L,GACL,MAAM,IAAIlD,MAAM,UAAUkD,kDAAsD4L,SAAiBC,KACpG,EAWL,qBAAMM,CAAgBP,EAAmB/B,GACrC,IAEI,GAAI9F,KAAKkG,YAAa,CACbJ,IACDA,EAAW+B,GAEf,MAAMhP,EAAQmH,KAAKiG,MAAMjJ,IAAI8I,GAC7B,QAAqB,IAAVjN,EACP,OAAO4O,EAAAA,GAAWC,UAAU7O,EAAM,IAElCqB,QAAQoN,MAAM,kCAAoCO,GAElD,OAD+BJ,EAAAA,GAAWC,gBAAgB1H,KAAKoG,WAAWyB,GAGjF,CAGG,OAD+BJ,EAAAA,GAAWC,gBAAgB1H,KAAKoG,WAAWyB,GAGjF,CAAC,MAAO5L,GACL,MAAM,IAAIlD,MAAM,UAAUkD,oCAAwC4L,IACrE,EAGL,sBAAMI,CAAiBpD,GACnB,IACI,GAAK7E,KAAKiG,MAAMiB,IAAIrC,EAAIwD,UAAarI,KAAKkG,YAOnC,CACH,MAAMoC,EAAyBtI,KAAKiG,MAAMjJ,IAAI6H,EAAIwD,SAClD,MAAO,CAACZ,EAAAA,GAAWC,UAAUY,EAAQ,IAAKX,EAAAA,GAAaD,UAAUY,EAAQ,IAC5E,CAVsD,CACnD,MAAMC,EAAgB1D,EAAIkC,eACpByB,QAAgCxI,KAAKoI,gBAAgBvD,EAAI4D,OAAQ5D,EAAIwD,SAI3E,OAHIrI,KAAKkG,aACLlG,KAAKiG,MAAM7K,IAAI2M,EAAqBW,YAAYL,QAAS,CAACG,EAAYxB,UAAWuB,EAAcvB,YAE5F,CAACwB,EAAaD,EACxB,CAIJ,CAAC,MAAOtM,GACL,MAAM,IAAIlD,MAAM,sCAAsCkD,IACzD,EAGL,oBAAM0M,GACF,OAAO3I,KAAKiI,iBAAiBF,EAAqBW,aAGtDE,iBAAAA,GACI,OAAO5I,KAAKiI,iBAAiBF,EAAqBc,gBAGtDC,qBAAAA,GACI,OAAO9I,KAAKiI,iBAAiBF,EAAqBgB,qBAqBtD,kBAAMC,CAAaC,GACf,GAAIC,EAAiBhC,IAAI+B,GACrB,aAAajJ,KAAKiI,iBAAiBF,EAAqBoB,kBACrD,GAAIC,EAA2BlC,IAAI+B,GACtC,aAAajJ,KAAKiI,iBAAiBF,EAAqBsB,4BACrD,GAAIC,EAAgBpC,IAAI+B,GAC3B,aAAajJ,KAAKiI,iBAAiBF,EAAqBwB,iBACrD,GAAIC,EAA0BtC,IAAI+B,GACrC,aAAajJ,KAAKiI,iBAAiBF,EAAqB0B,2BACrD,GAAIC,EAA2BxC,IAAI+B,GACtC,aAAajJ,KAAKiI,iBAAiBF,EAAqB4B,4BAExD,MAAM,IAAI5Q,MAAM,2BASxB,cAAM6Q,GACF,aAAa5J,KAAKiI,iBAAiBF,EAAqB9I,MAQ5D,eAAM4K,GACF,aAAa7J,KAAKiI,iBAAiBF,EAAqB+B,OAQ5D,oBAAMC,GACF,aAAa/J,KAAKiI,iBAAiBF,EAAqBiC,aAQ5D,mBAAMC,GACF,aAAajK,KAAKiI,iBAAiBF,EAAqBmC,YAS5D,qBAAM/B,CAAgBtC,GAClB,OAAQA,GACJ,KAAKkC,EAAqBW,YAAYyB,SAClC,OAAOpC,EAAqBW,YAAY3B,eAC5C,KAAKgB,EAAqBc,eAAesB,SACrC,OAAOpC,EAAqBc,eAAe9B,eAC/C,KAAKgB,EAAqBgB,oBAAoBoB,SAC1C,OAAOpC,EAAqBgB,oBAAoBhC,eACpD,KAAKgB,EAAqBiC,YAAYG,SAClC,OAAOpC,EAAqBiC,YAAYjD,eAC5C,KAAKgB,EAAqBmC,WAAWC,SACjC,OAAOpC,EAAqBmC,WAAWnD,eAC3C,KAAKgB,EAAqBqC,UAAUD,SAChC,OAAOpC,EAAqBqC,UAAUrD,eAC1C,KAAKgB,EAAqB9I,KAAKkL,SAC3B,OAAOpC,EAAqB9I,KAAK8H,eACrC,KAAKgB,EAAqBsC,oBAAoBF,SAC1C,OAAOpC,EAAqBsC,oBAAoBtD,eACpD,KAAKgB,EAAqB+B,MAAMK,SAC5B,OAAOpC,EAAqB+B,MAAM/C,eACtC,KAAKgB,EAAqBoB,iBAAiBgB,SACvC,OAAOpC,EAAqBoB,iBAAiBpC,eACjD,KAAKgB,EAAqBsB,2BAA2Bc,SACjD,OAAOpC,EAAqBsB,2BAA2BtC,eAC3D,KAAKgB,EAAqBwB,gBAAgBY,SACtC,OAAOpC,EAAqBwB,gBAAgBxC,eAChD,KAAKgB,EAAqB0B,0BAA0BU,SAChD,OAAOpC,EAAqB0B,0BAA0B1C,eAC1D,KAAKgB,EAAqB4B,2BAA2BQ,SACjD,OAAOpC,EAAqB4B,2BAA2B5C,eAC3D,KAAKgB,EAAqBuC,cAAcH,SACpC,OAAOpC,EAAqBuC,cAAcvD,eAC9C,QACI,IAEI,MAAMzH,QAAiBtC,EAAI6I,GACrB0E,QAAajL,EAASiL,OAC5B,OAAqB5C,EAAAA,GAAahF,WAAW4H,EAChD,CAAC,MAAOC,GAEL,IACA,OAAqB7C,EAAAA,GAAaD,gBAAgB1H,KAAKoG,WAAWP,GACjE,CAAC,MAAO4E,GACL,OAAO,IAAI1R,MAAM,iCAAmC0R,EACvD,CACJ,GAIbC,gBAAAA,GACI,OAAO1K,KAAKiI,iBAAiBF,EAAqBuC,gBC/hB1D,MAAMK,EACF5K,QACA6K,YACA/K,KACAgL,cACAC,eAQA1O,WAAAA,CAAYyD,EAA2B+K,EAA+CE,GAClF9K,KAAKH,KAAOA,GAAc,mCAC1BG,KAAK6K,cAAgB,IAAIjL,EAAkBI,KAAKH,MAEhDG,KAAK4K,YAAcA,GAA4B,IAAI5E,EACnDhG,KAAK8K,eAAiBA,EAQ1B7K,UAAAA,CAAWF,GACPC,KAAKD,QAAUA,EAQnBgL,cAAAA,CAAeH,GACX5K,KAAK4K,YAAcA,EAQvBzK,OAAAA,CAAQN,GACJG,KAAKH,KAAOA,EACZG,KAAK6K,cAAc1K,QAAQN,GAQ/BmL,iBAAAA,CAAkBF,GACd9K,KAAK8K,eAAiBA,EAkC1B,YAAMG,CACF3I,EACA4I,EACAC,EACAC,EACAC,EACA5K,GAGA,IACI,MAAM6K,EAAgB5H,EAAAA,GAAQf,WAAWL,GACzC,IAAIqC,EACJ,IACIA,QAAsB3E,KAAK6K,cAAc5G,WAAWqH,EAAclR,KACrE,CAAC,MAAOoQ,GAELtQ,QAAQqR,IAAI,WAAWD,EAAclR,mDACxC,CACD,GAA4B,iBAAjBuK,EACP,KAAO,WAAW2G,EAAclR,gEAEvC,CAAC,MAAOoQ,GACL,MAAM1F,EAAY,6BAA6B0F,IAClD,CAGD,IAiBIgB,EAjBAC,EAAuBhL,EAK3B,QAJ0B,IAAfA,QAAsD,IAAjBT,KAAKD,UACjD0L,EAAuBzL,KAAKD,QAAQU,mBAGJ,IAAzBgL,EACP,KAAM,uEAIV,IACIJ,EAAYF,QAAoCnL,KAAK0L,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB9P,CACnH,CAAC,MAAOkP,GACL,MAAM1F,EAAY,sDAAsD0F,sGAC3E,CAID,IACIgB,EAAUL,QAAoCnL,KAAK4K,YAAYb,uBAA0C/J,KAAK4K,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAM1F,EAAY,iDAAiD0F,+DACtE,CACD,MAAOmB,EAAeC,GAAmBJ,EAGzC,IAAIlH,EACJ,IACIA,QAAgBtE,KAAK6K,cAAcxG,kBAAkB/B,EACxD,CAAC,MAAOkI,GACL,MAAM1F,EAAY,qDAAqD0F,yGAC1E,CAGD,MAAMqB,QAAWC,EAAAA,GAAmBC,2BAA2BN,EAAsBnJ,EAAS4I,EAAKG,EAAWrL,KAAKH,KAAMyE,EAASqH,EAAeC,GACjJ,aAAa5L,KAAK6K,cAActF,kBAAkBsG,GA8BtD,+BAAMG,CAA0B3M,GAE5B,MAAM,YACF4M,EAAW,aACXC,EAAY,IACZhB,EAAG,WACHC,EAAU,OACVgB,EAAM,mBACNf,EAAkB,gBAClBgB,EAAe,WACf3L,EAAU,aACV4L,GACAhN,EAEJ,IAAIgM,EAAYhM,EAAQgM,UACpBvE,EAAazH,EAAQyH,WACrBC,EAAe1H,EAAQ0H,aACvBzE,EAAUjD,EAAQiD,QAClBgC,EAAUjF,EAAQiF,QAGtB,QAAgBhJ,IAAZgH,EACA,IACIA,QAAyBtC,KAAK6K,cAAc5G,WAAWgI,EAC1D,CAAC,MAAOzB,GACL,MAAM1F,EAAY,iBAAiBmH,yBAAmCzB,qGACzE,MACMlI,aAAmBoB,EAAAA,KAC1BpB,EAAUA,EAAQ7E,YAItB,IAiBI+N,EAjBAc,EAAsB7L,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBT,KAAKD,UACjDuM,EAAsBtM,KAAKD,QAAQU,mBAGJ,IAAxB6L,EACP,KAAM,uEAIV,IACIjB,EAAYF,QAAoCnL,KAAK0L,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB9P,CACnH,CAAC,MAAOkP,GACL,MAAM1F,EAAY,sDAAsD0F,sGAC3E,CAID,IACIgB,EAAUL,QAAoCnL,KAAK4K,YAAYb,uBAA0C/J,KAAK4K,YAAYX,eAC7H,CAAC,MAAOO,GACL,MAAM1F,EAAY,iDAAiD0F,+DACtE,CACD,MAAOmB,EAAeC,GAAmBJ,EAGzC,IAAK1E,IAAeC,EAChB,KACKD,EAAYC,SAAuC/G,KAAK4K,YAAYhD,aAAawE,EACrF,CAAC,MAAO5B,GACLtQ,QAAQqR,IAAI,kDAAkDf,4CACjE,CAKL,GADwB9G,EAAAA,GAAQf,WAAWL,GAASkC,aAAalH,OAC3C,IAAMgH,EACxB,IACIA,QAAgCtE,KAAK6K,cAAcxG,kBAAkB4H,EACxE,CAAC,MAAOzB,GACL,MAAM1F,EAAY,qDAAqD0F,yGAC1E,CAIL,aAAasB,EAAAA,GAAmBE,0BAA0BM,EAAqBhK,EAAS4J,EAAcC,EAAQjB,EAAKG,EAAWrL,KAAKH,KAAMyE,EAASwC,EAAYC,EAAc4E,EAAeC,EAAiBS,GA8BhN,aAAME,CAAQlN,GACV,MAAMwM,QAAwB7L,KAAKgM,0BAA0B3M,GAC7D,aAAaW,KAAK6K,cAActF,kBAAkBsG,GAoCtD,SAAMW,CACFlK,EACAmK,EACAN,EACAO,EACApI,EACA8H,EACAtF,EACAC,EACAtG,EACA4L,GAGA,IAAIC,EAAsB7L,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBT,KAAKD,UACjDuM,EAAsBtM,KAAKD,QAAQU,mBAGJ,IAAxB6L,EACP,KAAM,uEAIV,IAAKxF,IAAeC,EAChB,KACKD,EAAYC,SAAuC/G,KAAK4K,YAAYhD,aAAawE,EACrF,CAAC,MAAO5B,GACLtQ,QAAQqR,IAAI,kDAAkDf,4CACjE,CAOL,OAHAtQ,QAAQqR,IAAI,2BACZrR,QAAQqR,IAAI,gBAAiBzE,GAC7B5M,QAAQqR,IAAI,kBAAmBxE,GACxB+E,EAAAA,GAAmBa,uBAAuBL,EAAqBhK,EAASmK,EAAeN,EAAQO,GAAgB,EAAOpI,EAASwC,EAAYC,EAAc/G,KAAKH,KAAMwM,GAiB/K,UAAMpN,CACF2N,EACAC,EACA3B,EACAC,EACAC,EACAC,EACA5K,EACA4L,GAGA,IAUIb,EACA5B,EAXA0C,EAAsB7L,EAK1B,QAJ0B,IAAfA,QAAsD,IAAjBT,KAAKD,UACjDuM,EAAsBtM,KAAKD,QAAQU,mBAGJ,IAAxB6L,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoCnL,KAAK4K,YAAYb,uBAA0C/J,KAAK4K,YAAYX,gBAC1HL,QAAkC5J,KAAK4K,YAAYhB,UACtD,CAAC,MAAOY,GACL,MAAM1F,EAAY,iDAAiD0F,+DACtE,CACD,MAAOmB,EAAeC,GAAmBJ,GAClCsB,EAAgBC,GAAoBnD,EAG3C,IACIyB,EAAYF,QAAoCnL,KAAK0L,iBAAiBR,EAAK,GAAIG,EAAWD,QAAsB9P,CACnH,CAAC,MAAOkP,GACL,MAAM1F,EAAY,sDAAsD0F,sGAC3E,CAGD,IACIoC,EAAYA,aAAqBI,EAAAA,GAAkBJ,EAAYI,EAAAA,GAAgBrK,WAAWiK,GAC1FC,EAAYA,aAAqBG,EAAAA,GAAkBH,EAAYG,EAAAA,GAAgBrK,WAAWkK,EAC7F,CAAC,MAAOrC,GACL,MAAM1F,EAAY,kFACrB,CAGD,MAAM+G,QAAWC,EAAAA,GAAmBmB,qBAAqBX,EAAqBM,EAAWC,EAAW3B,EAAKG,EAAWrL,KAAKH,KAAMiN,EAAgBC,EAAkBpB,EAAeC,EAAiBS,GACjM,aAAarM,KAAK6K,cAActF,kBAAkBsG,GAyBtD,WAAM/B,CAAMoD,EAAqBC,EAAwC1M,EAAyB4L,GAE9F,IAUIxC,EAVAyC,EAAsB7L,EAK1B,QAJmC,IAAxB6L,QAA+D,IAAjBtM,KAAKD,UAC1DuM,EAAsBtM,KAAKD,QAAQU,mBAGJ,IAAxB6L,EACP,KAAM,uEAKV,IACIzC,QAAmC7J,KAAK4K,YAAYf,WACvD,CAAC,MAAOW,GACL,MAAM1F,EAAY,iDAAiD0F,+DACtE,CACD,MAAO4C,EAAiBC,GAAqBxD,EAG7C,IACIsD,EAAeA,aAAwBH,EAAAA,GAAkBG,EAAeH,EAAAA,GAAgBrK,WAAWwK,EACtG,CAAC,MAAO3C,GACL,MAAM1F,EAAY,8EACrB,CAGD,MAAM+G,QAAWC,EAAAA,GAAmBwB,sBAAsBhB,EAAqBY,EAAaC,EAAcnN,KAAKH,KAAMuN,EAAiBC,EAAmBhB,GACzJ,aAAarM,KAAK6K,cAActF,kBAAkBsG,GAatD,oBAAM0B,CACFjL,EACAkL,EACArB,EACA1L,GAGA,IAAI6D,EAEAgI,EAAsB7L,OACS,IAAxB6L,IAEHA,OADwB,IAAjBtM,KAAKD,QACUC,KAAKD,QAAQU,aAEb,IAAIY,EAAAA,IAKlC,IACIiD,QAAgBtE,KAAK6K,cAAcxG,kBAAkB/B,GACrD,MAAMgG,QAAgBwD,EAAAA,GAAmB2B,kBACrCnB,EACAhK,EACAkL,EACArB,EACA7H,GAEJ,MAAO,CAAagE,EAAQxB,aAA4BwB,EAAQvB,eACnE,CAAC,MAAOyD,GACL,MAAM1F,EAAY,qCAAqC0F,oEAC1D,EAgCL,8BAAMkD,CACFC,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACA5K,EACA4L,GAGAwB,EAAuBC,EAAqBD,GAG5C,IAUIrC,EACAxC,EAXAsD,EAAsB7L,EAK1B,QAJmC,IAAxB6L,QAA+D,IAAjBtM,KAAKD,UAC1DuM,EAAsBtM,KAAKD,QAAQU,mBAGJ,IAAxB6L,EACP,KAAM,uEAMV,IACId,EAAUL,QAAoCnL,KAAK4K,YAAYb,uBAA0C/J,KAAK4K,YAAYX,gBAC1HjB,QAAsChJ,KAAK4K,YAAY5B,aAAa6E,EACvE,CAAC,MAAOrD,GACL,MAAM1F,EAAY,iDAAiD0F,+DACtE,CACD,MAAOmB,EAAeC,GAAmBJ,GAClCuC,EAAoBC,GAAwBhF,EAGnD,IAEI,MAAMpI,EAAmB,GACrBqN,EAAqBJ,IAErBV,QAAsCnN,KAAK0L,iBAAiBR,EAAK,GAAIiC,EAAc/B,GACnFxK,EAAOwC,KAAK+J,EAAapK,UAEzBoK,OAAe7R,EAEnB+P,EAAYF,QAAoCnL,KAAK0L,iBAAiBR,EAAKtK,EAAQyK,EAAWD,QAAsB9P,CACvH,CAAC,MAAOkP,GACL,MAAM1F,EAAY,sDAAsD0F,sGAC3E,CAGD,aAAasB,EAAAA,GAAmB4B,yBAAyBpB,EAAqBqB,EAAQC,EAAWC,EAAcV,EAAcjC,EAAKG,EAAWrL,KAAKH,KAAMkO,EAAoBC,EAAsBrC,EAAeC,EAAiBS,GAmBtO,oCAAM6B,CACFP,EACAC,EACA1C,EACAzK,EACA4L,GAEA,OAAOrM,KAAK0N,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAO5P,OAAWA,OAAWA,EAAWmF,EAAY4L,GAmB/H,4CAAM8B,CACFR,EACAC,EACA1C,EACAzK,EACA4L,GAEA,OAAOrM,KAAK0N,yBAAyBC,EAAQC,EAAW,SAAU1C,GAAK,OAAO5P,OAAWA,OAAWA,EAAWmF,EAAY4L,GA+B/H,cAAMhR,CACFsS,EACAC,EACAC,EACA3C,EACAC,EACAC,EACA+B,EACA9B,EACA5K,EACA4L,GAEA,MAAMR,QAAwB7L,KAAK0N,yBAAyBC,EAAQC,EAAWC,EAAc3C,EAAKC,EAAYC,EAAoB+B,EAAc9B,EAAW5K,EAAY4L,GACvK,aAAarM,KAAK6K,cAActF,kBAAkBsG,GAiCtD,gCAAMuC,CAA2BC,EAAwBC,EAA2BC,EAA4BZ,EAAgBtO,EAAmC,CAAC,GAChK,MAAMmP,EAAe5P,KAAK6P,MAAe,IAATd,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,cAAa,IAC5BhB,EAAM7L,EAAQ6L,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,EAAgBC,EAAmBC,EAAoB,GAAGC,EAAa/Q,iBAAgB,gBACjG2O,EAAkB,IAAIzG,EAAsB,CACxCC,UAAWmC,EAAqBW,YAAYD,OAC5C5C,YAAakC,EAAqBW,YAAYyB,SAC9CrE,SAAU,6BACZ,QACFxD,EAAUtC,KAAK0O,oBACZC,GACHtP,EAEEuP,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa3O,KAAKgM,0BAA0B4C,GA6BhD,gBAAMC,CAAWR,EAAwBC,EAA2BC,EAA2BZ,EAAgBtO,EAAmC,CAAC,GAC/I,MAAMwM,QAAwB7L,KAAKoO,2BAA2BC,EAAgBC,EAAmBC,EAAoBZ,EAAQtO,GAC7H,aAAaW,KAAK6K,cAActF,kBAAkBsG,GAiCtD,mCAAMiD,CAA8BR,EAA2BC,EAA4BZ,EAAgBoB,EAAoB1P,EAAmC,CAAC,GAC/J,MAAMmP,EAAe5P,KAAK6P,MAAe,IAATd,GAE1BqB,EAAqBpQ,KAAK6P,MAAMM,IAEhC,YACF9C,EAAc,eAAc,aAC5BC,EAAe,iBAAgB,IAC/BhB,EAAM7L,EAAQ6L,KAAO,IAAI,WACzBC,GAAa,EAAK,OAClBgB,EAAS,CAACmC,EAAmBC,EAAoB,GAAGC,EAAa/Q,gBAAiB,GAAGuR,EAAmBvR,gBAAe,gBACvH2O,EAAkB,IAAIzG,EAAsB,CACxCC,UAAWmC,EAAqBc,eAAeJ,OAC/C5C,YAAakC,EAAqBc,eAAesB,SACjDrE,SAAU,gCACZ,QACFxD,EAAUtC,KAAK0O,oBACZC,GACHtP,EAEEuP,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa3O,KAAKgM,0BAA0B4C,GA6BhD,mBAAMK,CAAcX,EAA2BC,EAA4BZ,EAAgBoB,EAAoB1P,EAAmC,CAAC,GAC/I,MAAMwM,QAAwB7L,KAAK8O,8BAA8BR,EAAmBC,EAAoBZ,EAAQoB,EAAY1P,GAC5H,aAAaW,KAAK6K,cAActF,kBAAkBsG,GAwBtD,kCAAMqD,CAA6Bb,EAAwBV,EAAgBtO,EAAmC,CAAC,GAC3G,MAAMmP,EAAe5P,KAAK6P,MAAe,IAATd,IAE1B,YACF1B,EAAc,eAAc,aAC5BC,EAAe,gBAAe,IAC9BhB,EAAM7L,EAAQ6L,KAAO,IAAG,WACxBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,EAAgB,GAAGG,EAAa/Q,iBAAgB,gBAC1D2O,EAAkB,IAAIzG,EAAsB,CACxCC,UAAWmC,EAAqBuC,cAAc7B,OAC9C5C,YAAakC,EAAqBuC,cAAcH,SAChDrE,SAAU,+BACZ,QACFxD,EAAUtC,KAAK0O,oBACZC,GACHtP,EAEEuP,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,OAAO3O,KAAKgM,0BAA0B4C,GA4B1C,kBAAMO,CAAad,EAAwBV,EAAgBtO,EAAmC,CAAC,GAC3F,MAAMwM,QAAwB7L,KAAKkP,6BAA6Bb,EAAgBV,EAAQtO,GACxF,aAAaW,KAAK6K,cAActF,kBAAkBsG,GAyBtD,uCAAMuD,CAAkCf,EAAwBhP,EAAmC,CAAC,GAChG,MAAM,YACF4M,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAM7L,EAAQ6L,KAAO,EAAC,WACtBC,GAAa,EAAK,OAClBgB,EAAS,CAACkC,GAAe,gBACzBjC,EAAkB,IAAIzG,EAAsB,CACxCC,UAAWmC,EAAqBgB,oBAAoBN,OACpD5C,YAAakC,EAAqBgB,oBAAoBoB,SACtDrE,SAAU,qCACZ,QACFxD,EAAUtC,KAAK0O,oBACZC,GACHtP,EAEEuP,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa3O,KAAKgM,0BAA0B4C,GAuBhD,uBAAMS,CAAkBhB,EAAwBhP,EAAmC,CAAC,GAChF,MAAMwM,QAAwB7L,KAAKoP,kCAAkCf,EAAgBhP,GACrF,aAAaW,KAAK6K,cAActF,kBAAkBsG,GAiCtD,uCAAMyD,CAAkCC,EAA0BlQ,EAAmC,CAAC,GAClG,MAAM,YACF4M,EAAc,eAAc,aAC5BC,EAAe,sBAAqB,IACpChB,EAAM,EAAC,WACPC,GAAa,EAAK,OAClBgB,EAAS,CAACoD,EAAgB9R,YAAW,gBACrC2O,EAAkB,IAAIzG,EAAsB,CACxCC,UAAWmC,EAAqBsC,oBAAoB5B,OACpD5C,YAAakC,EAAqBsC,oBAAoBF,SACtDrE,SAAU,wCAEX6I,GACHtP,EAEEuP,EAAiC,CACnC3C,cACAC,eACAhB,MACAC,aACAgB,SACAC,qBACGuC,GAGP,aAAa3O,KAAKuM,QAAQqC,GA8B9B,uBAAMY,CAAkBD,EAA0BlQ,EAAmC,CAAC,GAClF,MAAMwM,QAAmB7L,KAAKsP,kCAAkCC,EAAiBlQ,GACjF,OAAOW,KAAK6K,cAActF,kBAAkBsG,GAShD4D,eAAAA,CAAgBC,GACZ,IACI,MAAMxN,EAAuBwN,EAAkBC,eACzCnC,EAAckC,EAAkBE,gBAChCtN,EAAUoN,EAAkBzL,aAC5B8C,EAAe2I,EAAkBvH,kBACvC,OAAO0H,EAAAA,EAAAA,IAAwB3N,EAAW6E,EAAczE,EAASkL,EACpE,CAAC,MAAMhD,GAEJ,OADAtQ,QAAQC,KAAK,6EACN,CACV,EASL2V,uBAAAA,CAAwBxN,GACpB,OAAOoB,EAAAA,GAAQf,WAAWL,GAQ9BoM,cAAAA,GACI,OAAOhL,EAAAA,GAAQqM,oBAQnBC,aAAAA,CAAc1N,GACV,IAEI,OADSoB,EAAAA,GAAQf,WAAWL,IACrB,CACV,CAAC,MAAOkI,GACL,OAAO,CACV,EAIL,sBAAMkB,CAAiBiC,EAAgB/M,EAAkB6B,EAAmCsD,GACxF,IACI,OAAOtD,aAAkBuK,EAAAA,GAAkBvK,EAASuK,EAAAA,GAAgBrK,WAAmBF,EAC1F,CAAC,MAAO+H,GACL,IACI,MAAMM,EAAiC9K,KAAK8K,eAC5C,aAA+BA,EAAemF,kBAAkBtC,GAAQ,EAAM/M,EAAQmF,EACzF,CAAC,MAAOyE,GACL,MAAM1F,EAAY,sDAAsD0F,sGAC3E,CACJ,GAKT,SAASyD,EAAqBJ,GAC1B,OAAOqC,EAAuBhJ,IAAI2G,EACtC,CAGA,SAASC,EAAqBD,GAC1B,OAAOsC,EAAqBjJ,IAAI2G,GAAgBA,EAC5C/I,EAAY,0BAA0B+I,8FAC9C,CCjwCA,MAAMtH,EAAY6J,EAAAA,GAASC,UAU3B,SAASC,EAAQC,GAEb,MAAMxJ,EAAgBY,EAAAA,GAAqB4I,EAASxJ,cAEpD,IAAKA,EACD,MAAM,IAAIhO,MAAM,wBAA0BwX,EAASxJ,cAGvD,MAAO,CACH7N,KAAMqX,EAASrX,KACfmP,QAASkI,EAASlI,QAClBI,OAAQ8H,EAAS9H,OACjB0B,SAAUoG,EAASpG,SACnBpD,eAER,CAEA,MAAMgB,EAAuB,CACzBW,YAAa4H,EAAQF,EAAAA,GAAS1H,eAC9BG,eAAgByH,EAAQF,EAAAA,GAASvH,kBACjCE,oBAAqBuH,EAAQF,EAAAA,GAASrH,uBACtCiB,YAAasG,EAAQF,EAAAA,GAASpG,eAC9BE,WAAYoG,EAAQF,EAAAA,GAASlG,cAC7BE,UAAWkG,EAAQF,EAAAA,GAAShG,aAC5BnL,KAAMqR,EAAQF,EAAAA,GAASnR,QACvBoL,oBAAqBiG,EAAQF,EAAAA,GAAS/F,uBACtCP,MAAOwG,EAAQF,EAAAA,GAAStG,SACxBX,iBAAkBmH,EAAQF,EAAAA,GAASjH,oBACnCE,2BAA4BiH,EAAQF,EAAAA,GAAS/G,8BAC7CE,gBAAiB+G,EAAQF,EAAAA,GAAS7G,mBAClCE,0BAA2B6G,EAAQF,EAAAA,GAAS3G,6BAC5CE,2BAA4B2G,EAAQF,EAAAA,GAASzG,8BAC7CW,cAAegG,EAAQF,EAAAA,GAAS9F,iBAChCtC,OAAQ,SAASnD,GACb,OAAI7E,KAAK0E,eAAeG,GACZ7E,KAAa6E,GAEd,IAAI9L,MAAM,QAAQ8L,mBAK/BqL,EAAyB,IAAIM,IAAI,CACnC,mBACA,UACA,kBACA,6BACA,kBACA,4BAEEL,EAAuB,IAAIK,IAAI,CACjC,mBACA,UACA,kBACA,6BACA,kBACA,0BACA,kBACA,4BACA,SACA,mBACA,iBACA,yBACA,6BACA,kBACA,iBACA,4BAEEtH,EAAmB,IAAIsH,IAAI,CAC7B,UACA,mBACA,oBAEEpH,EAA6B,IAAIoH,IAAI,CACvC,oBACA,kBACA,6BACA,4BAEElH,EAAkB,IAAIkH,IAAI,CAC5B,SACA,kBACA,mBAEEhH,EAA4B,IAAIgH,IAAI,CACtC,mBACA,4BACA,2BAEE9G,EAA6B,IAAI8G,IAAI,CACvC,oBACA,kBACA,6BACA,4BAGJ,SAAS1L,EAAY7L,GAEjB,MADAiB,QAAQ+B,MAAMhD,GACRA,CACV,yIC3GMwX,EAAAA,EAAAA,MAEN,MAAMC,EAAc,mCACd9F,EAAc,IAAI5E,EAAAA,gBAClB2K,EAAiB,IAAIhG,EAAAA,eACvB+F,EACA9F,OACAtP,GAGJsP,EAAYpE,UAAS,GAErB,IAAIoK,EAA2B,GAY/BzR,eAAeqN,EACXqE,EACAC,EACA3E,EACA1L,EACAiM,GAAiB,GAEjBxS,QAAQqR,IAAI,6CACZ,MAAMwF,EAAYC,YAAYC,MAE9B,IAEI,MAAM3O,EAAUqO,EAAeb,wBAAwBe,GACvD,GAAIvO,aAAmBvJ,MACnB,KAAM,qCAEV,MAAMmY,EAAa5O,EAAQlI,KAC3B,IAAKkI,EAAQ6O,YAAYL,GACrB,KAAM,WAAWI,+BAAwCJ,IAE7D,MAAMhL,EAAW,GAAGoL,KAAcJ,IAG5BxM,QAAgBqM,EAAe9F,cAAcxG,kBAC/CwM,GAGJ,GAAIvM,aAAmBvL,MACnB,KAAM,gCAGV,GAAI6X,IAAqBC,EAAc,CACnC,MAAMhK,QAA8B8J,EAAepD,eAC/CsD,EACAC,EACA3E,EACA9K,EAAAA,GAAWC,YAAYb,IAE3BkQ,EAAe/F,YAAYjE,UAAUb,EAAUe,GAC/C+J,EAAmBC,CACtB,CAGD,MAAMO,EAAY,IAAIzL,EAAAA,sBAAsB,CACxCG,SAAUA,IAIRxG,QAAiBqR,EAAenE,IAClCqE,EACAC,EACA3E,EACAO,EACApI,EACA8M,OACA9V,OACAA,EACA+F,EAAAA,GAAWC,YAAYb,IAI3BvG,QAAQqR,IACJ,4CACIyF,YAAYC,MAAQF,QAG5B,MAAMxO,EAAUjD,EAAS+R,aACnBnP,EAAY5C,EAASqQ,eAC3B,IAAI2B,EAAkB,GAEtB,MAAMzK,EAAO+D,EAAYvD,QAAQvB,GAEjC,GAAIe,aAAgB9N,MAChB,KAAM,8BAGV,MAAMgO,EAAeF,EAAK,GAiB1B,OAfI3E,IACA2N,EAAAA,EAAAA,IACI3N,EACA6E,EACAzE,EACA,SAEJgP,EAAkBpP,EAAUzE,WAC5BvD,QAAQqR,IAAI,oCAAsCrJ,IAElDoP,EAAkB,GAGtBpX,QAAQqR,IAAI,gCAAgChJ,KAErC,CAAEA,QAASA,EAASL,UAAWoP,EACzC,CAAC,MAAOrV,GAEL,OADA/B,QAAQ+B,MAAMA,GACPA,EAAQA,EAAMwB,WAAa,eACrC,CACL,CAEA0B,eAAeoS,IAEX,OADmB,IAAIlQ,EAAAA,IACLmQ,WACtB,CAEA,MAAMC,EAAY,CAAEjF,MAAK+E,kBACzBhZ,EAAAA,EAAAA,GAAOkZ","sources":["webpack://aleo-website/../node_modules/comlink/dist/esm/comlink.mjs","webpack://aleo-website/../src/utils.ts","webpack://aleo-website/../src/network-client.ts","webpack://aleo-website/../src/function-key-provider.ts","webpack://aleo-website/../src/program-manager.ts","webpack://aleo-website/../src/index.ts","webpack://aleo-website/../src/worker.ts"],"sourcesContent":["/**\n * @license\n * Copyright 2019 Google LLC\n * SPDX-License-Identifier: Apache-2.0\n */\nconst proxyMarker = Symbol(\"Comlink.proxy\");\nconst createEndpoint = Symbol(\"Comlink.endpoint\");\nconst releaseProxy = Symbol(\"Comlink.releaseProxy\");\nconst finalizer = Symbol(\"Comlink.finalizer\");\nconst throwMarker = Symbol(\"Comlink.thrown\");\nconst isObject = (val) => (typeof val === \"object\" && val !== null) || typeof val === \"function\";\n/**\n * Internal transfer handle to handle objects marked to proxy.\n */\nconst proxyTransferHandler = {\n canHandle: (val) => isObject(val) && val[proxyMarker],\n serialize(obj) {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port1);\n return [port2, [port2]];\n },\n deserialize(port) {\n port.start();\n return wrap(port);\n },\n};\n/**\n * Internal transfer handler to handle thrown exceptions.\n */\nconst throwTransferHandler = {\n canHandle: (value) => isObject(value) && throwMarker in value,\n serialize({ value }) {\n let serialized;\n if (value instanceof Error) {\n serialized = {\n isError: true,\n value: {\n message: value.message,\n name: value.name,\n stack: value.stack,\n },\n };\n }\n else {\n serialized = { isError: false, value };\n }\n return [serialized, []];\n },\n deserialize(serialized) {\n if (serialized.isError) {\n throw Object.assign(new Error(serialized.value.message), serialized.value);\n }\n throw serialized.value;\n },\n};\n/**\n * Allows customizing the serialization of certain values.\n */\nconst transferHandlers = new Map([\n [\"proxy\", proxyTransferHandler],\n [\"throw\", throwTransferHandler],\n]);\nfunction isAllowedOrigin(allowedOrigins, origin) {\n for (const allowedOrigin of allowedOrigins) {\n if (origin === allowedOrigin || allowedOrigin === \"*\") {\n return true;\n }\n if (allowedOrigin instanceof RegExp && allowedOrigin.test(origin)) {\n return true;\n }\n }\n return false;\n}\nfunction expose(obj, ep = globalThis, allowedOrigins = [\"*\"]) {\n ep.addEventListener(\"message\", function callback(ev) {\n if (!ev || !ev.data) {\n return;\n }\n if (!isAllowedOrigin(allowedOrigins, ev.origin)) {\n console.warn(`Invalid origin '${ev.origin}' for comlink proxy`);\n return;\n }\n const { id, type, path } = Object.assign({ path: [] }, ev.data);\n const argumentList = (ev.data.argumentList || []).map(fromWireValue);\n let returnValue;\n try {\n const parent = path.slice(0, -1).reduce((obj, prop) => obj[prop], obj);\n const rawValue = path.reduce((obj, prop) => obj[prop], obj);\n switch (type) {\n case \"GET\" /* MessageType.GET */:\n {\n returnValue = rawValue;\n }\n break;\n case \"SET\" /* MessageType.SET */:\n {\n parent[path.slice(-1)[0]] = fromWireValue(ev.data.value);\n returnValue = true;\n }\n break;\n case \"APPLY\" /* MessageType.APPLY */:\n {\n returnValue = rawValue.apply(parent, argumentList);\n }\n break;\n case \"CONSTRUCT\" /* MessageType.CONSTRUCT */:\n {\n const value = new rawValue(...argumentList);\n returnValue = proxy(value);\n }\n break;\n case \"ENDPOINT\" /* MessageType.ENDPOINT */:\n {\n const { port1, port2 } = new MessageChannel();\n expose(obj, port2);\n returnValue = transfer(port1, [port1]);\n }\n break;\n case \"RELEASE\" /* MessageType.RELEASE */:\n {\n returnValue = undefined;\n }\n break;\n default:\n return;\n }\n }\n catch (value) {\n returnValue = { value, [throwMarker]: 0 };\n }\n Promise.resolve(returnValue)\n .catch((value) => {\n return { value, [throwMarker]: 0 };\n })\n .then((returnValue) => {\n const [wireValue, transferables] = toWireValue(returnValue);\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n if (type === \"RELEASE\" /* MessageType.RELEASE */) {\n // detach and deactive after sending release response above.\n ep.removeEventListener(\"message\", callback);\n closeEndPoint(ep);\n if (finalizer in obj && typeof obj[finalizer] === \"function\") {\n obj[finalizer]();\n }\n }\n })\n .catch((error) => {\n // Send Serialization Error To Caller\n const [wireValue, transferables] = toWireValue({\n value: new TypeError(\"Unserializable return value\"),\n [throwMarker]: 0,\n });\n ep.postMessage(Object.assign(Object.assign({}, wireValue), { id }), transferables);\n });\n });\n if (ep.start) {\n ep.start();\n }\n}\nfunction isMessagePort(endpoint) {\n return endpoint.constructor.name === \"MessagePort\";\n}\nfunction closeEndPoint(endpoint) {\n if (isMessagePort(endpoint))\n endpoint.close();\n}\nfunction wrap(ep, target) {\n return createProxy(ep, [], target);\n}\nfunction throwIfProxyReleased(isReleased) {\n if (isReleased) {\n throw new Error(\"Proxy has been released and is not useable\");\n }\n}\nfunction releaseEndpoint(ep) {\n return requestResponseMessage(ep, {\n type: \"RELEASE\" /* MessageType.RELEASE */,\n }).then(() => {\n closeEndPoint(ep);\n });\n}\nconst proxyCounter = new WeakMap();\nconst proxyFinalizers = \"FinalizationRegistry\" in globalThis &&\n new FinalizationRegistry((ep) => {\n const newCount = (proxyCounter.get(ep) || 0) - 1;\n proxyCounter.set(ep, newCount);\n if (newCount === 0) {\n releaseEndpoint(ep);\n }\n });\nfunction registerProxy(proxy, ep) {\n const newCount = (proxyCounter.get(ep) || 0) + 1;\n proxyCounter.set(ep, newCount);\n if (proxyFinalizers) {\n proxyFinalizers.register(proxy, ep, proxy);\n }\n}\nfunction unregisterProxy(proxy) {\n if (proxyFinalizers) {\n proxyFinalizers.unregister(proxy);\n }\n}\nfunction createProxy(ep, path = [], target = function () { }) {\n let isProxyReleased = false;\n const proxy = new Proxy(target, {\n get(_target, prop) {\n throwIfProxyReleased(isProxyReleased);\n if (prop === releaseProxy) {\n return () => {\n unregisterProxy(proxy);\n releaseEndpoint(ep);\n isProxyReleased = true;\n };\n }\n if (prop === \"then\") {\n if (path.length === 0) {\n return { then: () => proxy };\n }\n const r = requestResponseMessage(ep, {\n type: \"GET\" /* MessageType.GET */,\n path: path.map((p) => p.toString()),\n }).then(fromWireValue);\n return r.then.bind(r);\n }\n return createProxy(ep, [...path, prop]);\n },\n set(_target, prop, rawValue) {\n throwIfProxyReleased(isProxyReleased);\n // FIXME: ES6 Proxy Handler `set` methods are supposed to return a\n // boolean. To show good will, we return true asynchronously ¯\\_(ツ)_/¯\n const [value, transferables] = toWireValue(rawValue);\n return requestResponseMessage(ep, {\n type: \"SET\" /* MessageType.SET */,\n path: [...path, prop].map((p) => p.toString()),\n value,\n }, transferables).then(fromWireValue);\n },\n apply(_target, _thisArg, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const last = path[path.length - 1];\n if (last === createEndpoint) {\n return requestResponseMessage(ep, {\n type: \"ENDPOINT\" /* MessageType.ENDPOINT */,\n }).then(fromWireValue);\n }\n // We just pretend that `bind()` didn’t happen.\n if (last === \"bind\") {\n return createProxy(ep, path.slice(0, -1));\n }\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"APPLY\" /* MessageType.APPLY */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n construct(_target, rawArgumentList) {\n throwIfProxyReleased(isProxyReleased);\n const [argumentList, transferables] = processArguments(rawArgumentList);\n return requestResponseMessage(ep, {\n type: \"CONSTRUCT\" /* MessageType.CONSTRUCT */,\n path: path.map((p) => p.toString()),\n argumentList,\n }, transferables).then(fromWireValue);\n },\n });\n registerProxy(proxy, ep);\n return proxy;\n}\nfunction myFlat(arr) {\n return Array.prototype.concat.apply([], arr);\n}\nfunction processArguments(argumentList) {\n const processed = argumentList.map(toWireValue);\n return [processed.map((v) => v[0]), myFlat(processed.map((v) => v[1]))];\n}\nconst transferCache = new WeakMap();\nfunction transfer(obj, transfers) {\n transferCache.set(obj, transfers);\n return obj;\n}\nfunction proxy(obj) {\n return Object.assign(obj, { [proxyMarker]: true });\n}\nfunction windowEndpoint(w, context = globalThis, targetOrigin = \"*\") {\n return {\n postMessage: (msg, transferables) => w.postMessage(msg, targetOrigin, transferables),\n addEventListener: context.addEventListener.bind(context),\n removeEventListener: context.removeEventListener.bind(context),\n };\n}\nfunction toWireValue(value) {\n for (const [name, handler] of transferHandlers) {\n if (handler.canHandle(value)) {\n const [serializedValue, transferables] = handler.serialize(value);\n return [\n {\n type: \"HANDLER\" /* WireValueType.HANDLER */,\n name,\n value: serializedValue,\n },\n transferables,\n ];\n }\n }\n return [\n {\n type: \"RAW\" /* WireValueType.RAW */,\n value,\n },\n transferCache.get(value) || [],\n ];\n}\nfunction fromWireValue(value) {\n switch (value.type) {\n case \"HANDLER\" /* WireValueType.HANDLER */:\n return transferHandlers.get(value.name).deserialize(value.value);\n case \"RAW\" /* WireValueType.RAW */:\n return value.value;\n }\n}\nfunction requestResponseMessage(ep, msg, transfers) {\n return new Promise((resolve) => {\n const id = generateUUID();\n ep.addEventListener(\"message\", function l(ev) {\n if (!ev.data || !ev.data.id || ev.data.id !== id) {\n return;\n }\n ep.removeEventListener(\"message\", l);\n resolve(ev.data);\n });\n if (ep.start) {\n ep.start();\n }\n ep.postMessage(Object.assign({ id }, msg), transfers);\n });\n}\nfunction generateUUID() {\n return new Array(4)\n .fill(0)\n .map(() => Math.floor(Math.random() * Number.MAX_SAFE_INTEGER).toString(16))\n .join(\"-\");\n}\n\nexport { createEndpoint, expose, finalizer, proxy, proxyMarker, releaseProxy, transfer, transferHandlers, windowEndpoint, wrap };\n//# sourceMappingURL=comlink.mjs.map\n","export async function get(url: URL | string, options?: RequestInit) {\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not get URL \" + url);\n }\n\n return response;\n}\n\n\nexport async function post(url: URL | string, options: RequestInit) {\n options.method = \"POST\";\n\n const response = await fetch(url, options);\n\n if (!response.ok) {\n throw new Error(response.status + \" could not post URL \" + url);\n }\n\n return response;\n}\n","import { get, post } from \"./utils\";\nimport {\n Account,\n Block,\n RecordCiphertext,\n Program,\n RecordPlaintext,\n PrivateKey,\n Transaction,\n TransactionModel,\n logAndThrow\n} from \"./index\";\n\ntype ProgramImports = { [key: string]: string | Program };\n\ninterface AleoNetworkClientOptions {\n headers?: { [key: string]: string };\n}\n\n/**\n * Client library that encapsulates REST calls to publicly exposed endpoints of Aleo nodes. The methods provided in this\n * allow users to query public information from the Aleo blockchain and submit transactions to the network.\n *\n * @param {string} host\n * @example\n * // Connection to a local node\n * const localNetworkClient = new AleoNetworkClient(\"http://localhost:3030\");\n *\n * // Connection to a public beacon node\n * const publicnetworkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n */\nclass AleoNetworkClient {\n host: string;\n headers: { [key: string]: string };\n account: Account | undefined;\n\n constructor(host: string, options?: AleoNetworkClientOptions) {\n this.host = host + \"/testnet\";\n\n if (options && options.headers) {\n this.headers = options.headers;\n\n } else {\n this.headers = {\n // This is replaced by the actual version by a Rollup plugin\n \"X-Aleo-SDK-Version\": \"%%VERSION%%\",\n };\n }\n }\n\n /**\n * Set an account to use in networkClient calls\n *\n * @param {Account} account\n * @example\n * const account = new Account();\n * networkClient.setAccount(account);\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Return the Aleo account used in the networkClient\n *\n * @example\n * const account = networkClient.getAccount();\n */\n getAccount(): Account | undefined {\n return this.account;\n }\n\n /**\n * Set a new host for the networkClient\n *\n * @param {string} host The address of a node hosting the Aleo API\n * @param host\n */\n setHost(host: string) {\n this.host = host + \"/testnet\";\n }\n\n async fetchData(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(this.host + url, {\n headers: this.headers\n });\n\n return await response.json();\n } catch (error) {\n throw new Error(\"Error fetching data.\");\n }\n }\n\n /**\n * Attempts to find unspent records in the Aleo blockchain for a specified private key\n * @param {number} startHeight - The height at which to start searching for unspent records\n * @param {number} endHeight - The height at which to stop searching for unspent records\n * @param {string | PrivateKey} privateKey - The private key to use to find unspent records\n * @param {number[]} amounts - The amounts (in microcredits) to search for (eg. [100, 200, 3000])\n * @param {number} maxMicrocredits - The maximum number of microcredits to search for\n * @param {string[]} nonces - The nonces of already found records to exclude from the search\n *\n * @example\n * // Find all unspent records\n * const privateKey = \"[PRIVATE_KEY]\";\n * const records = networkClient.findUnspentRecords(0, undefined, privateKey);\n *\n * // Find specific amounts\n * const startHeight = 500000;\n * const amounts = [600000, 1000000];\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, amounts);\n *\n * // Find specific amounts with a maximum number of cumulative microcredits\n * const maxMicrocredits = 100000;\n * const records = networkClient.findUnspentRecords(startHeight, undefined, privateKey, undefined, maxMicrocredits);\n */\n async findUnspentRecords(\n startHeight: number,\n endHeight: number | undefined,\n privateKey: string | PrivateKey | undefined,\n amounts: number[] | undefined,\n maxMicrocredits?: number | undefined,\n nonces?: string[] | undefined,\n ): Promise | Error> {\n nonces = nonces || [];\n // Ensure start height is not negative\n if (startHeight < 0) {\n throw new Error(\"Start height must be greater than or equal to 0\");\n }\n\n // Initialize search parameters\n const records = new Array();\n let start;\n let end;\n let resolvedPrivateKey: PrivateKey;\n let failures = 0;\n let totalRecordValue = BigInt(0);\n let latestHeight: number;\n\n // Ensure a private key is present to find owned records\n if (typeof privateKey === \"undefined\") {\n if (typeof this.account === \"undefined\") {\n throw new Error(\"Private key must be specified in an argument to findOwnedRecords or set in the AleoNetworkClient\");\n } else {\n resolvedPrivateKey = this.account._privateKey;\n }\n } else {\n try {\n resolvedPrivateKey = privateKey instanceof PrivateKey ? privateKey : PrivateKey.from_string(privateKey);\n } catch (error) {\n throw new Error(\"Error parsing private key provided.\");\n }\n }\n const viewKey = resolvedPrivateKey.to_view_key();\n\n // Get the latest height to ensure the range being searched is valid\n try {\n const blockHeight = await this.getLatestHeight();\n if (typeof blockHeight === \"number\") {\n latestHeight = blockHeight;\n } else {\n throw new Error(\"Error fetching latest block height.\");\n }\n } catch (error) {\n throw new Error(\"Error fetching latest block height.\");\n }\n\n // If no end height is specified or is greater than the latest height, set the end height to the latest height\n if (typeof endHeight === \"number\" && endHeight <= latestHeight) {\n end = endHeight\n } else {\n end = latestHeight;\n }\n\n // If the starting is greater than the ending height, return an error\n if (startHeight > end) {\n throw new Error(\"Start height must be less than or equal to end height.\");\n }\n\n // Iterate through blocks in reverse order in chunks of 50\n while (end > startHeight) {\n start = end - 50;\n if (start < startHeight) {\n start = startHeight;\n }\n try {\n // Get 50 blocks (or the difference between the start and end if less than 50)\n const blocks = await this.getBlockRange(start, end);\n end = start;\n if (!(blocks instanceof Error)) {\n // Iterate through blocks to find unspent records\n for (let i = 0; i < blocks.length; i++) {\n const block = blocks[i];\n const transactions = block.transactions;\n if (!(typeof transactions === \"undefined\")) {\n for (let j = 0; j < transactions.length; j++) {\n const confirmedTransaction = transactions[j];\n // Search for unspent records in execute transactions of credits.aleo\n if (confirmedTransaction.type == \"execute\") {\n const transaction = confirmedTransaction.transaction;\n if (transaction.execution && !(typeof transaction.execution.transitions == \"undefined\")) {\n for (let k = 0; k < transaction.execution.transitions.length; k++) {\n const transition = transaction.execution.transitions[k];\n // Only search for unspent records in credits.aleo (for now)\n if (transition.program !== \"credits.aleo\") {\n continue;\n }\n if (!(typeof transition.outputs == \"undefined\")) {\n for (let l = 0; l < transition.outputs.length; l++) {\n const output = transition.outputs[l];\n if (output.type === \"record\") {\n try {\n // Create a wasm record ciphertext object from the found output\n const record = RecordCiphertext.fromString(output.value);\n // Determine if the record is owned by the specified view key\n if (record.isOwner(viewKey)) {\n // Decrypt the record and get the serial number\n const recordPlaintext = record.decrypt(viewKey);\n\n // If the record has already been found, skip it\n const nonce = recordPlaintext.nonce();\n if (nonces.includes(nonce)) {\n continue;\n }\n\n // Otherwise record the nonce that has been found\n const serialNumber = recordPlaintext.serialNumberString(resolvedPrivateKey, \"credits.aleo\", \"credits\");\n // Attempt to see if the serial number is spent\n try {\n await this.getTransitionId(serialNumber);\n } catch (error) {\n // If it's not found, add it to the list of unspent records\n if (!amounts) {\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n }\n // If the user specified a list of amounts, check if the search has found them\n if (!(typeof amounts === \"undefined\") && amounts.length > 0) {\n let amounts_found = 0;\n if (recordPlaintext.microcredits() > amounts[amounts_found]) {\n amounts_found += 1;\n records.push(recordPlaintext);\n // If the user specified a maximum number of microcredits, check if the search has found enough\n if (typeof maxMicrocredits === \"number\") {\n totalRecordValue += recordPlaintext.microcredits();\n // Exit if the search has found the amount specified\n if (totalRecordValue >= BigInt(maxMicrocredits)) {\n return records;\n }\n }\n if (records.length >= amounts.length) {\n return records;\n }\n }\n }\n }\n }\n } catch (error) {\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n }\n } catch (error) {\n // If there is an error fetching blocks, log it and keep searching\n console.warn(\"Error fetching blocks in range: \" + start.toString() + \"-\" + end.toString());\n console.warn(\"Error: \", error);\n failures += 1;\n if (failures > 10) {\n console.warn(\"10 failures fetching records reached. Returning records fetched so far\");\n return records;\n }\n }\n }\n return records;\n }\n\n /**\n * Returns the contents of the block at the specified block height\n *\n * @param {number} height\n * @example\n * const block = networkClient.getBlock(1234);\n */\n async getBlock(height: number): Promise {\n try {\n const block = await this.fetchData(\"/block/\" + height);\n return block;\n } catch (error) {\n throw new Error(\"Error fetching block.\");\n }\n }\n\n /**\n * Returns a range of blocks between the specified block heights\n *\n * @param {number} start\n * @param {number} end\n * @example\n * const blockRange = networkClient.getBlockRange(2050, 2100);\n */\n async getBlockRange(start: number, end: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/blocks?start=\" + start + \"&end=\" + end);\n } catch (error) {\n const errorMessage = \"Error fetching blocks between \" + start + \" and \" + end + \".\"\n throw new Error(errorMessage);\n }\n }\n\n /**\n * Returns the deployment transaction id associated with the specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionIDForProgram(program: Program | string): Promise {\n if (program instanceof Program) {\n program = program.toString();\n }\n try {\n const id = await this.fetchData(\"/find/transactionID/deployment/\" + program);\n return id.replace(\"\\\"\", \"\")\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the deployment transaction associated with a specified program\n *\n * @param {Program | string} program\n * @returns {TransactionModel | Error}\n */\n async getDeploymentTransactionForProgram(program: Program | string): Promise {\n try {\n const transaction_id = await this.getDeploymentTransactionIDForProgram(program);\n return await this.getTransaction(transaction_id);\n } catch (error) {\n throw new Error(\"Error fetching deployment transaction for program.\");\n }\n }\n\n /**\n * Returns the contents of the latest block\n *\n * @example\n * const latestHeight = networkClient.getLatestBlock();\n */\n async getLatestBlock(): Promise {\n try {\n return await this.fetchData(\"/latest/block\") as Block;\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest committee\n *\n * @returns {Promise} A javascript object containing the latest committee\n */\n async getLatestCommittee(): Promise {\n try {\n return await this.fetchData(\"/committee/latest\");\n } catch (error) {\n throw new Error(\"Error fetching latest block.\");\n }\n }\n\n /**\n * Returns the latest block height\n *\n * @example\n * const latestHeight = networkClient.getLatestHeight();\n */\n async getLatestHeight(): Promise {\n try {\n return await this.fetchData(\"/latest/height\");\n } catch (error) {\n throw new Error(\"Error fetching latest height.\");\n }\n }\n\n /**\n * Returns the source code of a program given a program ID\n *\n * @param {string} programId The program ID of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const program = networkClient.getProgram(\"hello_hello.aleo\");\n * const expectedSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * assert.equal(program, expectedSource);\n */\n async getProgram(programId: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId)\n } catch (error) {\n throw new Error(\"Error fetching program\");\n }\n }\n\n /**\n * Returns a program object from a program ID or program source code\n *\n * @param {string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @return {Promise} Source code of the program\n *\n * @example\n * const programID = \"hello_hello.aleo\";\n * const programSource = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n *\n * // Get program object from program ID or program source code\n * const programObjectFromID = await networkClient.getProgramObject(programID);\n * const programObjectFromSource = await networkClient.getProgramObject(programSource);\n *\n * // Both program objects should be equal\n * assert.equal(programObjectFromID.to_string(), programObjectFromSource.to_string());\n */\n async getProgramObject(inputProgram: string): Promise {\n try {\n return Program.fromString(inputProgram);\n } catch (error) {\n try {\n return Program.fromString((await this.getProgram(inputProgram)));\n } catch (error) {\n throw new Error(`${inputProgram} is neither a program name or a valid program`);\n }\n }\n }\n\n /**\n * Returns an object containing the source code of a program and the source code of all programs it imports\n *\n * @param {Program | string} inputProgram The program ID or program source code of a program deployed to the Aleo Network\n * @returns {Promise} Object of the form { \"program_id\": \"program_source\", .. } containing program id & source code for all program imports\n *\n * @example\n * const double_test_source = \"import multiply_test.aleo;\\n\\nprogram double_test.aleo;\\n\\nfunction double_it:\\n input r0 as u32.private;\\n call multiply_test.aleo/multiply 2u32 r0 into r1;\\n output r1 as u32.private;\\n\"\n * const double_test = Program.fromString(double_test_source);\n * const expectedImports = {\n * \"multiply_test.aleo\": \"program multiply_test.aleo;\\n\\nfunction multiply:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n mul r0 r1 into r2;\\n output r2 as u32.private;\\n\"\n * }\n *\n * // Imports can be fetched using the program ID, source code, or program object\n * let programImports = await networkClient.getProgramImports(\"double_test.aleo\");\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program source code\n * programImports = await networkClient.getProgramImports(double_test_source);\n * assert.deepStrictEqual(programImports, expectedImports);\n *\n * // Using the program object\n * programImports = await networkClient.getProgramImports(double_test);\n * assert.deepStrictEqual(programImports, expectedImports);\n */\n async getProgramImports(inputProgram: Program | string): Promise {\n try {\n const imports: ProgramImports = {};\n\n // Get the program object or fail if the program is not valid or does not exist\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n\n // Get the list of programs that the program imports\n const importList = program.getImports();\n\n // Recursively get any imports that the imported programs have in a depth first search order\n for (let i = 0; i < importList.length; i++) {\n const import_id = importList[i];\n if (!imports.hasOwnProperty(import_id)) {\n const programSource = await this.getProgram(import_id);\n const nestedImports = await this.getProgramImports(import_id);\n for (const key in nestedImports) {\n if (!imports.hasOwnProperty(key)) {\n imports[key] = nestedImports[key];\n }\n }\n imports[import_id] = programSource;\n }\n }\n return imports;\n } catch (error) {\n throw logAndThrow(\"Error fetching program imports: \" + error)\n }\n }\n\n /**\n * Get a list of the program names that a program imports\n *\n * @param {Program | string} inputProgram - The program id or program source code to get the imports of\n * @returns {string[]} - The list of program names that the program imports\n *\n * @example\n * const programImportsNames = networkClient.getProgramImports(\"double_test.aleo\");\n * const expectedImportsNames = [\"multiply_test.aleo\"];\n * assert.deepStrictEqual(programImportsNames, expectedImportsNames);\n */\n async getProgramImportNames(inputProgram: Program | string): Promise {\n try {\n const program = inputProgram instanceof Program ? inputProgram : (await this.getProgramObject(inputProgram));\n return program.getImports();\n } catch (error) {\n throw new Error(\"Error fetching program imports with error: \" + error);\n }\n }\n\n /**\n * Returns the names of the mappings of a program\n *\n * @param {string} programId - The program ID to get the mappings of (e.g. \"credits.aleo\")\n * @example\n * const mappings = networkClient.getProgramMappingNames(\"credits.aleo\");\n * const expectedMappings = [\"account\"];\n * assert.deepStrictEqual(mappings, expectedMappings);\n */\n async getProgramMappingNames(programId: string): Promise | Error> {\n try {\n return await this.fetchData>(\"/program/\" + programId + \"/mappings\")\n } catch (error) {\n throw new Error(\"Error fetching program mappings - ensure the program exists on chain before trying again\");\n }\n }\n\n /**\n * Returns the value of a program's mapping for a specific key\n *\n * @param {string} programId - The program ID to get the mapping value of (e.g. \"credits.aleo\")\n * @param {string} mappingName - The name of the mapping to get the value of (e.g. \"account\")\n * @param {string} key - The key of the mapping to get the value of (e.g. \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\")\n * @return {Promise} String representation of the value of the mapping\n *\n * @example\n * // Get public balance of an account\n * const mappingValue = networkClient.getMappingValue(\"credits.aleo\", \"account\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\");\n * const expectedValue = \"0u64\";\n * assert.equal(mappingValue, expectedValue);\n */\n async getProgramMappingValue(programId: string, mappingName: string, key: string): Promise {\n try {\n return await this.fetchData(\"/program/\" + programId + \"/mapping/\" + mappingName + \"/\" + key)\n } catch (error) {\n throw new Error(\"Error fetching mapping value - ensure the mapping exists and the key is correct\");\n }\n }\n\n /**\n * Returns the latest state/merkle root of the Aleo blockchain\n *\n * @example\n * const stateRoot = networkClient.getStateRoot();\n */\n async getStateRoot(): Promise {\n try {\n return await this.fetchData(\"/latest/stateRoot\");\n } catch (error) {\n throw new Error(\"Error fetching Aleo state root\");\n }\n }\n\n /**\n * Returns a transaction by its unique identifier\n *\n * @param {string} id\n * @example\n * const transaction = networkClient.getTransaction(\"at1handz9xjrqeynjrr0xay4pcsgtnczdksz3e584vfsgaz0dh0lyxq43a4wj\");\n */\n async getTransaction(id: string): Promise {\n try {\n return await this.fetchData(\"/transaction/\" + id);\n } catch (error) {\n throw new Error(\"Error fetching transaction.\");\n }\n }\n\n /**\n * Returns the transactions present at the specified block height\n *\n * @param {number} height\n * @example\n * const transactions = networkClient.getTransactions(654);\n */\n async getTransactions(height: number): Promise | Error> {\n try {\n return await this.fetchData>(\"/block/\" + height.toString() + \"/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions.\");\n }\n }\n\n /**\n * Returns the transactions in the memory pool.\n *\n * @example\n * const transactions = networkClient.getTransactionsInMempool();\n */\n async getTransactionsInMempool(): Promise | Error> {\n try {\n return await this.fetchData>(\"/memoryPool/transactions\");\n } catch (error) {\n throw new Error(\"Error fetching transactions from mempool.\");\n }\n }\n\n /**\n * Returns the transition ID of the transition corresponding to the ID of the input or output.\n * @param {string} inputOrOutputID - ID of the input or output.\n *\n * @example\n * const transitionId = networkClient.getTransitionId(\"2429232855236830926144356377868449890830704336664550203176918782554219952323field\");\n */\n async getTransitionId(inputOrOutputID: string): Promise {\n try {\n return await this.fetchData(\"/find/transitionID/\" + inputOrOutputID);\n } catch (error) {\n throw new Error(\"Error fetching transition ID.\");\n }\n }\n\n /**\n * Submit an execute or deployment transaction to the Aleo network\n *\n * @param {Transaction | string} transaction - The transaction to submit to the network\n * @returns {string | Error} - The transaction id of the submitted transaction or the resulting error\n */\n async submitTransaction(transaction: Transaction | string): Promise {\n const transaction_string = transaction instanceof Transaction ? transaction.toString() : transaction;\n try {\n const response = await post(this.host + \"/transaction/broadcast\", {\n body: transaction_string,\n headers: Object.assign({}, this.headers, {\n \"Content-Type\": \"application/json\",\n }),\n });\n\n try {\n return await response.json();\n\n } catch (error) {\n throw new Error(`Error posting transaction. Aleo network response: ${(error as Error).message}`);\n }\n } catch (error) {\n throw new Error(`Error posting transaction: No response received: ${(error as Error).message}`);\n }\n }\n}\n\nexport { AleoNetworkClient, AleoNetworkClientOptions, ProgramImports }\n","import {\n ProvingKey,\n VerifyingKey,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n Key,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PUBLIC_TRANSFER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER\n} from \"./index\";\nimport { get } from \"./utils\";\n\ntype FunctionKeyPair = [ProvingKey, VerifyingKey];\ntype CachedKeyPair = [Uint8Array, Uint8Array];\ntype AleoKeyProviderInitParams = {\n proverUri?: string;\n verifierUri?: string;\n cacheKey?: string;\n};\n\n/**\n * Interface for record search parameters. This allows for arbitrary search parameters to be passed to record provider\n * implementations.\n */\ninterface KeySearchParams {\n [key: string]: any; // This allows for arbitrary keys with any type values\n}\n\n/**\n * AleoKeyProviderParams search parameter for the AleoKeyProvider. It allows for the specification of a proverUri and\n * verifierUri to fetch keys via HTTP from a remote resource as well as a unique cacheKey to store the keys in memory.\n */\nclass AleoKeyProviderParams implements KeySearchParams {\n name: string | undefined;\n proverUri: string | undefined;\n verifierUri: string | undefined;\n cacheKey: string | undefined;\n\n /**\n * Create a new AleoKeyProviderParams object which implements the KeySearchParams interface. Users can optionally\n * specify a url for the proverUri & verifierUri to fetch keys via HTTP from a remote resource as well as a unique\n * cacheKey to store the keys in memory for future use. If no proverUri or verifierUri is specified, a cachekey must\n * be provided.\n *\n * @param { AleoKeyProviderInitParams } params - Optional search parameters\n */\n constructor(params: {proverUri?: string, verifierUri?: string, cacheKey?: string, name?: string}) {\n this.proverUri = params.proverUri;\n this.verifierUri = params.verifierUri;\n this.cacheKey = params.cacheKey;\n this.name = params.name;\n }\n}\n\n/**\n * KeyProvider interface. Enables the retrieval of public proving and verifying keys for Aleo Programs.\n */\ninterface FunctionKeyProvider {\n /**\n * Get bond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_public function\n */\n bondPublicKeys(): Promise;\n\n /**\n * Get bond_validator function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the bond_validator function\n */\n bondValidatorKeys(): Promise;\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair): void;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the unbond_public function\n */\n claimUnbondPublicKeys(): Promise;\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams | undefined} params - Optional search parameters for the key provider\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a search object which implements the KeySearchParams interface\n * class IndexDbSearch implements KeySearchParams {\n * db: string\n * keyId: string\n * constructor(params: {db: string, keyId: string}) {\n * this.db = params.db;\n * this.keyId = params.keyId;\n * }\n * }\n *\n * // Create a new object which implements the KeyProvider interface\n * class IndexDbKeyProvider implements FunctionKeyProvider {\n * async functionKeys(params: KeySearchParams): Promise {\n * return new Promise((resolve, reject) => {\n * const request = indexedDB.open(params.db, 1);\n *\n * request.onupgradeneeded = function(e) {\n * const db = e.target.result;\n * if (!db.objectStoreNames.contains('keys')) {\n * db.createObjectStore('keys', { keyPath: 'id' });\n * }\n * };\n *\n * request.onsuccess = function(e) {\n * const db = e.target.result;\n * const transaction = db.transaction([\"keys\"], \"readonly\");\n * const store = transaction.objectStore(\"keys\");\n * const request = store.get(params.keyId);\n * request.onsuccess = function(e) {\n * if (request.result) {\n * resolve(request.result as FunctionKeyPair);\n * } else {\n * reject(new Error(\"Key not found\"));\n * }\n * };\n * request.onerror = function(e) { reject(new Error(\"Error fetching key\")); };\n * };\n *\n * request.onerror = function(e) { reject(new Error(\"Error opening database\")); };\n * });\n * }\n *\n * // implement the other methods...\n * }\n *\n *\n * const keyProvider = new AleoKeyProvider();\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const searchParams = new IndexDbSearch({db: \"keys\", keyId: \"credits.aleo:transferPrivate\"});\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(searchParams);\n */\n functionKeys(params?: KeySearchParams): Promise;\n\n /**\n * Get fee_private function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePrivateKeys(): Promise;\n\n /**\n * Get fee_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n feePublicKeys(): Promise;\n\n /**\n * Get join function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n joinKeys(): Promise;\n\n /**\n * Get split function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n splitKeys(): Promise;\n\n /**\n * Get keys for a variant of the transfer function from the credits.aleo program\n *\n * @param {string} visibility Visibility of the transfer function (private, public, privateToPublic, publicToPrivate)\n * @returns {Promise} Proving and verifying keys for the specified transfer function\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n transferKeys(visibility: string): Promise;\n\n /**\n * Get unbond_public function keys from the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n unBondPublicKeys(): Promise;\n\n}\n\n\n/**\n * AleoKeyProvider class. Implements the KeyProvider interface. Enables the retrieval of Aleo program proving and\n * verifying keys for the credits.aleo program over http from official Aleo sources and storing and retrieving function\n * keys from a local memory cache.\n */\nclass AleoKeyProvider implements FunctionKeyProvider {\n cache: Map;\n cacheOption: boolean;\n keyUris: string;\n\n async fetchBytes(\n url = \"/\",\n ): Promise {\n try {\n const response = await get(url);\n const data = await response.arrayBuffer();\n return new Uint8Array(data);\n } catch (error) {\n throw new Error(\"Error fetching data.\" + error);\n }\n }\n\n constructor() {\n this.keyUris = KEY_STORE;\n this.cache = new Map();\n this.cacheOption = false;\n }\n\n /**\n * Use local memory to store keys\n *\n * @param {boolean} useCache whether to store keys in local memory\n */\n useCache(useCache: boolean) {\n this.cacheOption = useCache;\n }\n\n /**\n * Clear the key cache\n */\n clearCache() {\n this.cache.clear();\n }\n\n /**\n * Cache a set of keys. This will overwrite any existing keys with the same keyId. The user can check if a keyId\n * exists in the cache using the containsKeys method prior to calling this method if overwriting is not desired.\n *\n * @param {string} keyId access key for the cache\n * @param {FunctionKeyPair} keys keys to cache\n */\n cacheKeys(keyId: string, keys: FunctionKeyPair) {\n const [provingKey, verifyingKey] = keys;\n this.cache.set(keyId, [provingKey.toBytes(), verifyingKey.toBytes()]);\n }\n\n /**\n * Determine if a keyId exists in the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair\n * @returns {boolean} true if the keyId exists in the cache, false otherwise\n */\n containsKeys(keyId: string): boolean {\n return this.cache.has(keyId)\n }\n\n /**\n * Delete a set of keys from the cache\n *\n * @param {string} keyId keyId of a proving and verifying key pair to delete from memory\n * @returns {boolean} true if the keyId exists in the cache and was deleted, false if the key did not exist\n */\n deleteKeys(keyId: string): boolean {\n return this.cache.delete(keyId)\n }\n\n /**\n * Get a set of keys from the cache\n * @param keyId keyId of a proving and verifying key pair\n *\n * @returns {FunctionKeyPair | Error} Proving and verifying keys for the specified program\n */\n getKeys(keyId: string): FunctionKeyPair | Error {\n console.debug(`Checking if key exists in cache. KeyId: ${keyId}`)\n if (this.cache.has(keyId)) {\n const [provingKeyBytes, verifyingKeyBytes] = this.cache.get(keyId);\n return [ProvingKey.fromBytes(provingKeyBytes), VerifyingKey.fromBytes(verifyingKeyBytes)];\n } else {\n return new Error(\"Key not found in cache.\");\n }\n }\n\n /**\n * Get arbitrary function keys from a provider\n *\n * @param {KeySearchParams} params parameters for the key search in form of: {proverUri: string, verifierUri: string, cacheKey: string}\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new object which implements the KeyProvider interface\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually using the key provider\n * const keySearchParams = { \"cacheKey\": \"myProgram:myFunction\" };\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.functionKeys(keySearchParams);\n */\n async functionKeys(params?: KeySearchParams): Promise {\n if (params) {\n let proverUrl;\n let verifierUrl;\n let cacheKey;\n if (\"name\" in params && typeof params[\"name\"] == \"string\") {\n let key = CREDITS_PROGRAM_KEYS.getKey(params[\"name\"]);\n if (!(key instanceof Error)) {\n return this.fetchCreditsKeys(key);\n }\n }\n\n if (\"proverUri\" in params && typeof params[\"proverUri\"] == \"string\") {\n proverUrl = params[\"proverUri\"];\n }\n\n if (\"verifierUri\" in params && typeof params[\"verifierUri\"] == \"string\") {\n verifierUrl = params[\"verifierUri\"];\n }\n\n if (\"cacheKey\" in params && typeof params[\"cacheKey\"] == \"string\") {\n cacheKey = params[\"cacheKey\"];\n }\n\n if (proverUrl && verifierUrl) {\n return await this.fetchRemoteKeys(proverUrl, verifierUrl, cacheKey);\n }\n\n if (cacheKey) {\n return this.getKeys(cacheKey);\n }\n }\n throw Error(\"Invalid parameters provided, must provide either a cacheKey and/or a proverUrl and a verifierUrl\");\n }\n\n /**\n * Returns the proving and verifying keys for a specified program from a specified url.\n *\n * @param {string} verifierUrl Url of the proving key\n * @param {string} proverUrl Url the verifying key\n * @param {string} cacheKey Key to store the keys in the cache\n *\n * @returns {Promise} Proving and verifying keys for the specified program\n *\n * @example\n * // Create a new AleoKeyProvider object\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPrivateProvingKey, transferPrivateVerifyingKey] = await keyProvider.fetchKeys(\n * CREDITS_PROGRAM_KEYS.transfer_private.prover,\n * CREDITS_PROGRAM_KEYS.transfer_private.verifier,\n * );\n */\n async fetchRemoteKeys(proverUrl: string, verifierUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return [ProvingKey.fromBytes(value[0]), VerifyingKey.fromBytes(value[1])];\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n console.debug(\"Fetching verifying keys \" + verifierUrl);\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n this.cache.set(cacheKey, [provingKey.toBytes(), verifyingKey.toBytes()]);\n return [provingKey, verifyingKey];\n }\n }\n else {\n // If cache is disabled, fetch the keys and return them\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl))\n const verifyingKey = (await this.getVerifyingKey(verifierUrl));\n return [provingKey, verifyingKey];\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving and verifying keys from ${proverUrl} and ${verifierUrl}.`);\n }\n }\n\n /***\n * Fetches the proving key from a remote source.\n *\n * @param proverUrl\n * @param cacheKey\n *\n * @returns {Promise} Proving key for the specified program\n */\n async fetchProvingKey(proverUrl: string, cacheKey?: string): Promise {\n try {\n // If cache is enabled, check if the keys have already been fetched and return them if they have\n if (this.cacheOption) {\n if (!cacheKey) {\n cacheKey = proverUrl;\n }\n const value = this.cache.get(cacheKey);\n if (typeof value !== \"undefined\") {\n return ProvingKey.fromBytes(value[0]);\n } else {\n console.debug(\"Fetching proving keys from url \" + proverUrl);\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n }\n else {\n const provingKey = ProvingKey.fromBytes(await this.fetchBytes(proverUrl));\n return provingKey;\n }\n } catch (error) {\n throw new Error(`Error: ${error} fetching fee proving keys from ${proverUrl}`);\n }\n }\n\n async fetchCreditsKeys(key: Key): Promise {\n try {\n if (!this.cache.has(key.locator) || !this.cacheOption) {\n const verifying_key = key.verifyingKey()\n const proving_key = await this.fetchProvingKey(key.prover, key.locator);\n if (this.cacheOption) {\n this.cache.set(CREDITS_PROGRAM_KEYS.bond_public.locator, [proving_key.toBytes(), verifying_key.toBytes()]);\n }\n return [proving_key, verifying_key];\n } else {\n const keyPair = this.cache.get(key.locator);\n return [ProvingKey.fromBytes(keyPair[0]), VerifyingKey.fromBytes(keyPair[1])];\n }\n } catch (error) {\n throw new Error(`Error: fetching credits.aleo keys: ${error}`);\n }\n }\n\n async bondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_public);\n }\n\n bondValidatorKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.bond_validator);\n }\n\n claimUnbondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.claim_unbond_public)\n }\n\n /**\n * Returns the proving and verifying keys for the transfer functions in the credits.aleo program\n * @param {string} visibility Visibility of the transfer function\n * @returns {Promise} Proving and verifying keys for the transfer functions\n *\n * @example\n * // Create a new AleoKeyProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for value transfers\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * programManager.transfer(1, \"aleo166q6ww6688cug7qxwe7nhctjpymydwzy2h7rscfmatqmfwnjvggqcad0at\", \"public\", 0.5);\n *\n * // Keys can also be fetched manually\n * const [transferPublicProvingKey, transferPublicVerifyingKey] = await keyProvider.transferKeys(\"public\");\n */\n async transferKeys(visibility: string): Promise {\n if (PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private);\n } else if (PRIVATE_TO_PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_private_to_public);\n } else if (PUBLIC_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public);\n } else if (PUBLIC_TRANSFER_AS_SIGNER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_as_signer);\n } else if (PUBLIC_TO_PRIVATE_TRANSFER.has(visibility)) {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.transfer_public_to_private);\n } else {\n throw new Error(\"Invalid visibility type\");\n }\n }\n\n /**\n * Returns the proving and verifying keys for the join function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the join function\n */\n async joinKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.join);\n }\n\n /**\n * Returns the proving and verifying keys for the split function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the split function\n * */\n async splitKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.split);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_private function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePrivateKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_private);\n }\n\n /**\n * Returns the proving and verifying keys for the fee_public function in the credits.aleo program\n *\n * @returns {Promise} Proving and verifying keys for the fee function\n */\n async feePublicKeys(): Promise {\n return await this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.fee_public);\n }\n\n /**\n * Gets a verifying key. If the verifying key is for a credits.aleo function, get it from the wasm cache otherwise\n *\n * @returns {Promise} Verifying key for the function\n */\n // attempt to fetch it from the network\n async getVerifyingKey(verifierUri: string): Promise {\n switch (verifierUri) {\n case CREDITS_PROGRAM_KEYS.bond_public.verifier:\n return CREDITS_PROGRAM_KEYS.bond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.bond_validator.verifier:\n return CREDITS_PROGRAM_KEYS.bond_validator.verifyingKey();\n case CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.claim_unbond_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_private.verifier:\n return CREDITS_PROGRAM_KEYS.fee_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.fee_public.verifier:\n return CREDITS_PROGRAM_KEYS.fee_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.inclusion.verifier:\n return CREDITS_PROGRAM_KEYS.inclusion.verifyingKey();\n case CREDITS_PROGRAM_KEYS.join.verifier:\n return CREDITS_PROGRAM_KEYS.join.verifyingKey();\n case CREDITS_PROGRAM_KEYS.set_validator_state.verifier:\n return CREDITS_PROGRAM_KEYS.set_validator_state.verifyingKey();\n case CREDITS_PROGRAM_KEYS.split.verifier:\n return CREDITS_PROGRAM_KEYS.split.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_private_to_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_as_signer.verifyingKey();\n case CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifier:\n return CREDITS_PROGRAM_KEYS.transfer_public_to_private.verifyingKey();\n case CREDITS_PROGRAM_KEYS.unbond_public.verifier:\n return CREDITS_PROGRAM_KEYS.unbond_public.verifyingKey();\n default:\n try {\n /// Try to fetch the verifying key from the network as a string\n const response = await get(verifierUri);\n const text = await response.text();\n return VerifyingKey.fromString(text);\n } catch (e) {\n /// If that fails, try to fetch the verifying key from the network as bytes\n try {\n return VerifyingKey.fromBytes(await this.fetchBytes(verifierUri));\n } catch (inner) {\n return new Error(\"Invalid verifying key. Error: \" + inner);\n }\n }\n }\n }\n\n unBondPublicKeys(): Promise {\n return this.fetchCreditsKeys(CREDITS_PROGRAM_KEYS.unbond_public);\n }\n}\n\nexport {AleoKeyProvider, AleoKeyProviderParams, AleoKeyProviderInitParams, CachedKeyPair, FunctionKeyPair, FunctionKeyProvider, KeySearchParams}\n","import {\n Account,\n AleoKeyProvider,\n AleoNetworkClient,\n ExecutionResponse,\n FunctionKeyProvider,\n FunctionKeyPair,\n OfflineQuery,\n KeySearchParams,\n RecordPlaintext,\n RecordProvider,\n RecordSearchParams,\n PrivateKey,\n Program,\n ProgramImports,\n ProvingKey,\n VerifyingKey,\n Transaction,\n PRIVATE_TRANSFER_TYPES,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n ProgramManagerBase as WasmProgramManager, verifyFunctionExecution, AleoKeyProviderParams, CREDITS_PROGRAM_KEYS,\n} from \"./index\";\nimport {Execution} from \"@provablehq/wasm/dist/crates/aleo_wasm\";\n\n/**\n * Represents the options for executing a transaction in the Aleo network.\n * This interface is used to specify the parameters required for building and submitting an execution transaction.\n *\n * @property {string} programName - The name of the program containing the function to be executed.\n * @property {string} functionName - The name of the function to execute within the program.\n * @property {number} fee - The fee to be paid for the transaction.\n * @property {boolean} privateFee - If true, uses a private record to pay the fee; otherwise, uses the account's public credit balance.\n * @property {string[]} inputs - The inputs to the function being executed.\n * @property {RecordSearchParams} [recordSearchParams] - Optional parameters for searching for a record to pay the execution transaction fee.\n * @property {KeySearchParams} [keySearchParams] - Optional parameters for finding the matching proving & verifying keys for the function.\n * @property {string | RecordPlaintext} [feeRecord] - Optional fee record to use for the transaction.\n * @property {ProvingKey} [provingKey] - Optional proving key to use for the transaction.\n * @property {VerifyingKey} [verifyingKey] - Optional verifying key to use for the transaction.\n * @property {PrivateKey} [privateKey] - Optional private key to use for the transaction.\n * @property {OfflineQuery} [offlineQuery] - Optional offline query if creating transactions in an offline environment.\n * @property {string | Program} [program] - Optional program source code to use for the transaction.\n * @property {ProgramImports} [imports] - Optional programs that the program being executed imports.\n */\ninterface ExecuteOptions {\n programName: string;\n functionName: string;\n fee: number;\n privateFee: boolean;\n inputs: string[];\n recordSearchParams?: RecordSearchParams;\n keySearchParams?: KeySearchParams;\n feeRecord?: string | RecordPlaintext;\n provingKey?: ProvingKey;\n verifyingKey?: VerifyingKey;\n privateKey?: PrivateKey;\n offlineQuery?: OfflineQuery;\n program?: string | Program;\n imports?: ProgramImports;\n}\n\n/**\n * The ProgramManager class is used to execute and deploy programs on the Aleo network and create value transfers.\n */\nclass ProgramManager {\n account: Account | undefined;\n keyProvider: FunctionKeyProvider;\n host: string;\n networkClient: AleoNetworkClient;\n recordProvider: RecordProvider | undefined;\n\n /** Create a new instance of the ProgramManager\n *\n * @param { string | undefined } host A host uri running the official Aleo API\n * @param { FunctionKeyProvider | undefined } keyProvider A key provider that implements {@link FunctionKeyProvider} interface\n * @param { RecordProvider | undefined } recordProvider A record provider that implements {@link RecordProvider} interface\n */\n constructor(host?: string | undefined, keyProvider?: FunctionKeyProvider | undefined, recordProvider?: RecordProvider | undefined) {\n this.host = host ? host : 'https://api.explorer.aleo.org/v1';\n this.networkClient = new AleoNetworkClient(this.host);\n \n this.keyProvider = keyProvider ? keyProvider : new AleoKeyProvider();\n this.recordProvider = recordProvider;\n }\n\n /**\n * Set the account to use for transaction submission to the Aleo network\n *\n * @param {Account} account Account to use for transaction submission\n */\n setAccount(account: Account) {\n this.account = account;\n }\n\n /**\n * Set the key provider that provides the proving and verifying keys for programs\n *\n * @param {FunctionKeyProvider} keyProvider\n */\n setKeyProvider(keyProvider: FunctionKeyProvider) {\n this.keyProvider = keyProvider;\n }\n\n /**\n * Set the host peer to use for transaction submission to the Aleo network\n *\n * @param host {string} Peer url to use for transaction submission\n */\n setHost(host: string) {\n this.host = host;\n this.networkClient.setHost(host);\n }\n\n /**\n * Set the record provider that provides records for transactions\n *\n * @param {RecordProvider} recordProvider\n */\n setRecordProvider(recordProvider: RecordProvider) {\n this.recordProvider = recordProvider;\n }\n\n /**\n * Deploy an Aleo program to the Aleo network\n *\n * @param {string} program Program source code\n * @param {number} fee Fee to pay for the transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for searching for a record to use\n * pay the deployment fee\n * @param {string | RecordPlaintext | undefined} feeRecord Optional Fee record to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @returns {string | Error} The transaction id of the deployed program or a failure message from the network\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for deployments\n * const program = \"program hello_hello.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Define a fee in credits\n * const fee = 1.2;\n *\n * // Deploy the program\n * const tx_id = await programManager.deploy(program, fee);\n *\n * // Verify the transaction was successful\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async deploy(\n program: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n feeRecord?: string | RecordPlaintext,\n privateKey?: PrivateKey,\n ): Promise {\n // Ensure the program is valid and does not exist on the network\n try {\n const programObject = Program.fromString(program);\n let programSource;\n try {\n programSource = await this.networkClient.getProgram(programObject.id());\n } catch (e) {\n // Program does not exist on the network, deployment can proceed\n console.log(`Program ${programObject.id()} does not exist on the network, deploying...`);\n }\n if (typeof programSource == \"string\") {\n throw (`Program ${programObject.id()} already exists on the network, please rename your program`);\n }\n } catch (e) {\n throw logAndThrow(`Error validating program: ${e}`);\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let deploymentPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n deploymentPrivateKey = this.account.privateKey();\n }\n\n if (typeof deploymentPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // Resolve the program imports if they exist\n let imports;\n try {\n imports = await this.networkClient.getProgramImports(program);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n\n // Build a deployment transaction and submit it to the network\n const tx = await WasmProgramManager.buildDeploymentTransaction(deploymentPrivateKey, program, fee, feeRecord, this.host, imports, feeProvingKey, feeVerifyingKey);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.buildExecutionTransaction({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async buildExecutionTransaction(options: ExecuteOptions): Promise {\n // Destructure the options object to access the parameters\n const {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n recordSearchParams,\n keySearchParams,\n privateKey,\n offlineQuery\n } = options;\n\n let feeRecord = options.feeRecord;\n let provingKey = options.provingKey;\n let verifyingKey = options.verifyingKey;\n let program = options.program;\n let imports = options.imports;\n\n // Ensure the function exists on the network\n if (program === undefined) {\n try {\n program = (await this.networkClient.getProgram(programName));\n } catch (e) {\n throw logAndThrow(`Error finding ${programName}. Network response: '${e}'. Please ensure you're connected to a valid Aleo network the program is deployed to the network.`);\n }\n } else if (program instanceof Program) {\n program = program.toString();\n }\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Get the fee proving and verifying keys from the key provider\n let feeKeys;\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Resolve the program imports if they exist\n const numberOfImports = Program.fromString(program).getImports().length;\n if (numberOfImports > 0 && !imports) {\n try {\n imports = await this.networkClient.getProgramImports(programName);\n } catch (e) {\n throw logAndThrow(`Error finding program imports. Network response: '${e}'. Please ensure you're connected to a valid Aleo network and the program is deployed to the network.`);\n }\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildExecutionTransaction(executionPrivateKey, program, functionName, inputs, fee, feeRecord, this.host, imports, provingKey, verifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Builds an execution transaction for submission to the Aleo network.\n *\n * @param {ExecuteOptions} options - The options for the execution transaction.\n * @returns {Promise} - A promise that resolves to the transaction or an error.\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider using official Aleo record, key, and network providers\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n *\n * // Build and execute the transaction\n * const transaction = await programManager.execute({\n * programName: \"hello_hello.aleo\",\n * functionName: \"hello_hello\",\n * fee: 0.020,\n * privateFee: false,\n * inputs: [\"5u32\", \"5u32\"],\n * keySearchParams: { \"cacheKey\": \"hello_hello:hello\" }\n * });\n * const result = await programManager.networkClient.submitTransaction(transaction);\n */\n async execute(options: ExecuteOptions): Promise {\n const tx = await this.buildExecutionTransaction(options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Run an Aleo program in offline mode\n *\n * @param {string} program Program source code containing the function to be executed\n * @param {string} function_name Function name to execute\n * @param {string[]} inputs Inputs to the function\n * @param {number} proveExecution Whether to prove the execution of the function and return an execution transcript\n * that contains the proof.\n * @param {string[] | undefined} imports Optional imports to the program\n * @param {KeySearchParams | undefined} keySearchParams Optional parameters for finding the matching proving &\n * verifying keys for the function\n * @param {ProvingKey | undefined} provingKey Optional proving key to use for the transaction\n * @param {VerifyingKey | undefined} verifyingKey Optional verifying key to use for the transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * import { Account, Program } from '@provablehq/sdk';\n *\n * /// Create the source for the \"helloworld\" program\n * const program = \"program helloworld.aleo;\\n\\nfunction hello:\\n input r0 as u32.public;\\n input r1 as u32.private;\\n add r0 r1 into r2;\\n output r2 as u32.private;\\n\";\n * const programManager = new ProgramManager();\n *\n * /// Create a temporary account for the execution of the program\n * const account = new Account();\n * programManager.setAccount(account);\n *\n * /// Get the response and ensure that the program executed correctly\n * const executionResponse = await programManager.run(program, \"hello\", [\"5u32\", \"5u32\"]);\n * const result = executionResponse.getOutputs();\n * assert(result === [\"10u32\"]);\n */\n async run(\n program: string,\n function_name: string,\n inputs: string[],\n proveExecution: boolean,\n imports?: ProgramImports,\n keySearchParams?: KeySearchParams,\n provingKey?: ProvingKey,\n verifyingKey?: VerifyingKey,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // If the function proving and verifying keys are not provided, attempt to find them using the key provider\n if (!provingKey || !verifyingKey) {\n try {\n [provingKey, verifyingKey] = await this.keyProvider.functionKeys(keySearchParams);\n } catch (e) {\n console.log(`Function keys not found. Key finder response: '${e}'. The function keys will be synthesized`)\n }\n }\n\n // Run the program offline and return the result\n console.log(\"Running program offline\")\n console.log(\"Proving key: \", provingKey);\n console.log(\"Verifying key: \", verifyingKey);\n return WasmProgramManager.executeFunctionOffline(executionPrivateKey, program, function_name, inputs, proveExecution, false, imports, provingKey, verifyingKey, this.host, offlineQuery);\n }\n\n /**\n * Join two credits records into a single credits record\n *\n * @param {RecordPlaintext | string} recordOne First credits record to join\n * @param {RecordPlaintext | string} recordTwo Second credits record to join\n * @param {number} fee Fee in credits pay for the join transaction\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the fee record to use\n * to pay the fee for the join transaction\n * @param {RecordPlaintext | string | undefined} feeRecord Fee record to use for the join transaction\n * @param {PrivateKey | undefined} privateKey Private key to use for the join transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n */\n async join(\n recordOne: RecordPlaintext | string,\n recordTwo: RecordPlaintext | string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams | undefined,\n feeRecord?: RecordPlaintext | string | undefined,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery,\n ): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof privateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let joinKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n joinKeys = await this.keyProvider.joinKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [joinProvingKey, joinVerifyingKey] = joinKeys;\n\n // Get the fee record from the account if it is not provided in the parameters\n try {\n feeRecord = privateFee ? await this.getCreditsRecord(fee, [], feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Validate the records provided are valid plaintext records\n try {\n recordOne = recordOne instanceof RecordPlaintext ? recordOne : RecordPlaintext.fromString(recordOne);\n recordTwo = recordTwo instanceof RecordPlaintext ? recordTwo : RecordPlaintext.fromString(recordTwo);\n } catch (e) {\n throw logAndThrow('Records provided are not valid. Please ensure they are valid plaintext records.')\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildJoinTransaction(executionPrivateKey, recordOne, recordTwo, fee, feeRecord, this.host, joinProvingKey, joinVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Split credits into two new credits records\n *\n * @param {number} splitAmount Amount in microcredits to split from the original credits record\n * @param {RecordPlaintext | string} amountRecord Amount record to use for the split transaction\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the split transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise}\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * const record = \"{ owner: aleo184vuwr5u7u0ha5f5k44067dd2uaqewxx6pe5ltha5pv99wvhfqxqv339h4.private, microcredits: 45000000u64.private, _nonce: 4106205762862305308495708971985748592380064201230396559307556388725936304984group.public}\"\n * const tx_id = await programManager.split(25000000, record);\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async split(splitAmount: number, amountRecord: RecordPlaintext | string, privateKey?: PrivateKey, offlineQuery?: OfflineQuery): Promise {\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the split keys from the key provider\n let splitKeys;\n try {\n splitKeys = await this.keyProvider.splitKeys();\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [splitProvingKey, splitVerifyingKey] = splitKeys;\n\n // Validate the record to be split\n try {\n amountRecord = amountRecord instanceof RecordPlaintext ? amountRecord : RecordPlaintext.fromString(amountRecord);\n } catch (e) {\n throw logAndThrow(\"Record provided is not valid. Please ensure it is a valid plaintext record.\");\n }\n\n // Build an execution transaction and submit it to the network\n const tx = await WasmProgramManager.buildSplitTransaction(executionPrivateKey, splitAmount, amountRecord, this.host, splitProvingKey, splitVerifyingKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Pre-synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code to synthesize keys for\n * @param function_id {string} The function id to synthesize keys for\n * @param inputs {Array} Sample inputs to the function\n * @param privateKey {PrivateKey | undefined} Optional private key to use for the key synthesis\n *\n * @returns {Promise}\n */\n async synthesizeKeys(\n program: string,\n function_id: string,\n inputs: Array,\n privateKey?: PrivateKey,\n ): Promise {\n // Resolve the program imports if they exist\n let imports;\n\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\") {\n if (typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n } else {\n executionPrivateKey = new PrivateKey();\n }\n }\n\n // Attempt to run an offline execution of the program and extract the proving and verifying keys\n try {\n imports = await this.networkClient.getProgramImports(program);\n const keyPair = await WasmProgramManager.synthesizeKeyPair(\n executionPrivateKey,\n program,\n function_id,\n inputs,\n imports\n );\n return [keyPair.provingKey(), keyPair.verifyingKey()];\n } catch (e) {\n throw logAndThrow(`Could not synthesize keys - error ${e}. Please ensure the program is valid and the inputs are correct.`);\n }\n }\n\n /**\n * Build a transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programName = \"hello_hello.aleo\";\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async buildTransferTransaction(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n // Validate the transfer type\n transferType = validateTransferType(transferType);\n\n // Get the private key from the account if it is not provided in the parameters\n let executionPrivateKey = privateKey;\n if (typeof executionPrivateKey === \"undefined\" && typeof this.account !== \"undefined\") {\n executionPrivateKey = this.account.privateKey();\n }\n\n if (typeof executionPrivateKey === \"undefined\") {\n throw(\"No private key provided and no private key set in the ProgramManager\");\n }\n\n // Get the proving and verifying keys from the key provider\n let feeKeys;\n let transferKeys\n try {\n feeKeys = privateFee ? await this.keyProvider.feePrivateKeys() : await this.keyProvider.feePublicKeys();\n transferKeys = await this.keyProvider.transferKeys(transferType);\n } catch (e) {\n throw logAndThrow(`Error finding fee keys. Key finder response: '${e}'. Please ensure your key provider is configured correctly.`);\n }\n const [feeProvingKey, feeVerifyingKey] = feeKeys;\n const [transferProvingKey, transferVerifyingKey] = transferKeys;\n\n // Get the amount and fee record from the account if it is not provided in the parameters\n try {\n // Track the nonces of the records found so no duplicate records are used\n const nonces: string[] = [];\n if (requiresAmountRecord(transferType)) {\n // If the transfer type is private and requires an amount record, get it from the record provider\n amountRecord = await this.getCreditsRecord(fee, [], amountRecord, recordSearchParams);\n nonces.push(amountRecord.nonce());\n } else {\n amountRecord = undefined;\n }\n feeRecord = privateFee ? await this.getCreditsRecord(fee, nonces, feeRecord, recordSearchParams) : undefined;\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n\n // Build an execution transaction and submit it to the network\n return await WasmProgramManager.buildTransferTransaction(executionPrivateKey, amount, recipient, transferType, amountRecord, fee, feeRecord, this.host, transferProvingKey, transferVerifyingKey, feeProvingKey, feeVerifyingKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Build a transfer_public_as_signer transaction to transfer credits to another account for later submission to the Aleo network\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n */\n async buildTransferPublicAsSignerTransaction(\n amount: number,\n recipient: string,\n fee: number,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n return this.buildTransferTransaction(amount, recipient, \"public\", fee, false, undefined, undefined, undefined, privateKey, offlineQuery);\n }\n\n /**\n * Transfer credits to another account\n *\n * @param {number} amount The amount of credits to transfer\n * @param {string} recipient The recipient of the transfer\n * @param {string} transferType The type of transfer to perform - options: 'private', 'privateToPublic', 'public', 'publicToPrivate'\n * @param {number} fee The fee to pay for the transfer\n * @param {boolean} privateFee Use a private record to pay the fee. If false this will use the account's public credit balance\n * @param {RecordSearchParams | undefined} recordSearchParams Optional parameters for finding the amount and fee\n * records for the transfer transaction\n * @param {RecordPlaintext | string} amountRecord Optional amount record to use for the transfer\n * @param {RecordPlaintext | string} feeRecord Optional fee record to use for the transfer\n * @param {PrivateKey | undefined} privateKey Optional private key to use for the transfer transaction\n * @param {OfflineQuery | undefined} offlineQuery Optional offline query if creating transactions in an offline environment\n * @returns {Promise} The transaction id of the transfer transaction\n *\n * @example\n * // Create a new NetworkClient, KeyProvider, and RecordProvider\n * const networkClient = new AleoNetworkClient(\"https://api.explorer.aleo.org/v1\");\n * const keyProvider = new AleoKeyProvider();\n * const recordProvider = new NetworkRecordProvider(account, networkClient);\n *\n * // Initialize a program manager with the key provider to automatically fetch keys for executions\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, recordProvider);\n * await programManager.initialize();\n * const tx_id = await programManager.transfer(1, \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"private\", 0.2)\n * const transaction = await programManager.networkClient.getTransaction(tx_id);\n */\n async transfer(\n amount: number,\n recipient: string,\n transferType: string,\n fee: number,\n privateFee: boolean,\n recordSearchParams?: RecordSearchParams,\n amountRecord?: RecordPlaintext | string,\n feeRecord?: RecordPlaintext | string,\n privateKey?: PrivateKey,\n offlineQuery?: OfflineQuery\n ): Promise {\n const tx = await this.buildTransferTransaction(amount, recipient, transferType, fee, privateFee, recordSearchParams, amountRecord, feeRecord, privateKey, offlineQuery);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build transaction to bond credits to a validator for later submission to the Aleo Network\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction object for later submission\n * const tx = await programManager.buildBondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be later submitted to the network using the network client.\n * const result = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Partial} options - Override default execution options.\n */\n async buildBondPublicTransaction(staker_address: string, validator_address: string, withdrawal_address: string, amount: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_public\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [staker_address, validator_address, withdrawal_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_public.verifier,\n cacheKey: \"credits.aleo/bond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Bond credits to validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", \"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is bonding the credits\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the signer (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 1,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {Options} options Options for the execution\n */\n async bondPublic(staker_address: string, validator_address: string, withdrawal_address:string, amount: number, options: Partial = {}) {\n const tx = await this.buildBondPublicTransaction(staker_address, validator_address, withdrawal_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a bond_validator transaction for later submission to the Aleo Network.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bond validator transaction object for later use.\n * const tx = await programManager.buildBondValidatorTransaction(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n * console.log(tx);\n *\n * // The transaction can later be submitted to the network using the network client.\n * const tx_id = await programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async buildBondValidatorTransaction(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const adjustedCommission = Math.trunc(commission)\n\n const {\n programName = \"credits.aleo\",\n functionName = \"bond_validator\",\n fee = options.fee || 0.86,\n privateFee = false,\n inputs = [validator_address, withdrawal_address, `${scaledAmount.toString()}u64`, `${adjustedCommission.toString()}u8`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.bond_validator.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.bond_validator.verifier,\n cacheKey: \"credits.aleo/bond_validator\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Build transaction to bond a validator.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.bondValidator(\"aleo1rhgdu77hgyqd3xjj8ucu3jj9r2krwz6mnzyd80gncr5fxcwlh5rsvzp9px\", \"aleo1feya8sjy9k2zflvl2dx39pdsq5tju28elnp2ektnn588uu9ghv8s84msv9\", 2000000);\n *\n * @returns string\n * @param {string} validator_address Address of the validator to bond to, if this address is the same as the staker (i.e. the\n * executor of this function), it will attempt to bond the credits as a validator. Bonding as a validator currently\n * requires a minimum of 10,000,000 credits to bond (subject to change). If the address is specified is an existing\n * validator and is different from the address of the executor of this function, it will bond the credits to that\n * validator's staking committee as a delegator. A minimum of 10 credits is required to bond as a delegator.\n * @param {string} withdrawal_address Address to withdraw the staked credits to when unbond_public is called.\n * @param {number} amount The amount of credits to bond\n * @param {number} commission The commission rate for the validator (must be between 0 and 100 - an error will be thrown if it is not)\n * @param {Partial} options - Override default execution options.\n */\n async bondValidator(validator_address: string, withdrawal_address: string, amount: number, commission: number, options: Partial = {}) {\n const tx = await this.buildBondValidatorTransaction(validator_address, withdrawal_address, amount, commission, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to unbond public credits from a validator in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is unbonding the credits.\n * @param {number} amount - The amount of credits to unbond (scaled by 1,000,000).\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management.\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to unbond credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * const tx = await programManager.buildUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 2000000);\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildUnbondPublicTransaction(staker_address: string, amount: number, options: Partial = {}): Promise {\n const scaledAmount = Math.trunc(amount * 1000000);\n\n const {\n programName = \"credits.aleo\",\n functionName = \"unbond_public\",\n fee = options.fee || 1.3,\n privateFee = false,\n inputs = [staker_address, `${scaledAmount.toString()}u64`],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.unbond_public.verifier,\n cacheKey: \"credits.aleo/unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Unbond a specified amount of staked credits.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction and send it to the network\n * const tx_id = await programManager.unbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\", 10);\n *\n * @returns string\n * @param {string} staker_address Address of the staker who is unbonding the credits\n * @param {number} amount Amount of credits to unbond. If the address of the executor of this function is an\n * existing validator, it will subtract this amount of credits from the validator's staked credits. If there are\n * less than 1,000,000 credits staked pool after the unbond, the validator will be removed from the validator set.\n * If the address of the executor of this function is not a validator and has credits bonded as a delegator, it will\n * subtract this amount of credits from the delegator's staked credits. If there are less than 10 credits bonded\n * after the unbond operation, the delegator will be removed from the validator's staking pool.\n * @param {ExecuteOptions} options Options for the execution\n */\n async unbondPublic(staker_address: string, amount: number, options: Partial = {}): Promise {\n const tx = await this.buildUnbondPublicTransaction(staker_address, amount, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a transaction to claim unbonded public credits in the Aleo network.\n *\n * @param {string} staker_address - The address of the staker who is claiming the credits.\n * @param {Partial} options - Override default execution options.\n * @returns {Promise} - A promise that resolves to the transaction or an error message.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to claim unbonded credits.\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n *\n * // Create the claim unbonded transaction object for later use.\n * const tx = await programManager.buildClaimUnbondPublicTransaction(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n * console.log(tx);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n */\n async buildClaimUnbondPublicTransaction(staker_address: string, options: Partial = {}): Promise {\n const {\n programName = \"credits.aleo\",\n functionName = \"claim_unbond_public\",\n fee = options.fee || 2,\n privateFee = false,\n inputs = [staker_address],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.claim_unbond_public.verifier,\n cacheKey: \"credits.aleo/claim_unbond_public\"\n }),\n program = this.creditsProgram(),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.buildExecutionTransaction(executeOptions);\n }\n\n /**\n * Claim unbonded credits. If credits have been unbonded by the account executing this function, this method will\n * claim them and add them to the public balance of the account.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"YourPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.claimUnbondPublic(\"aleo1jx8s4dvjepculny4wfrzwyhs3tlyv65r58ns3g6q2gm2esh7ps8sqy9s5j\");\n *\n * @param {string} staker_address Address of the staker who is claiming the credits\n * @param {ExecuteOptions} options\n * @returns string\n */\n async claimUnbondPublic(staker_address: string, options: Partial = {}): Promise {\n const tx = await this.buildClaimUnbondPublicTransaction(staker_address, options);\n return await this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Build a set_validator_state transaction for later usage.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx = await programManager.buildSetValidatorStateTransaction(true);\n *\n * // The transaction can be submitted later to the network using the network client.\n * programManager.networkClient.submitTransaction(tx);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async buildSetValidatorStateTransaction(validator_state: boolean, options: Partial = {}) {\n const {\n programName = \"credits.aleo\",\n functionName = \"set_validator_state\",\n fee = 1,\n privateFee = false,\n inputs = [validator_state.toString()],\n keySearchParams = new AleoKeyProviderParams({\n proverUri: CREDITS_PROGRAM_KEYS.set_validator_state.prover,\n verifierUri: CREDITS_PROGRAM_KEYS.set_validator_state.verifier,\n cacheKey: \"credits.aleo/set_validator_state\"\n }),\n ...additionalOptions\n } = options;\n\n const executeOptions: ExecuteOptions = {\n programName,\n functionName,\n fee,\n privateFee,\n inputs,\n keySearchParams,\n ...additionalOptions\n };\n\n return await this.execute(executeOptions);\n }\n\n /**\n * Submit a set_validator_state transaction to the Aleo Network.\n *\n * This function allows a validator to set their state to be either opened or closed to new stakers.\n * When the validator is open to new stakers, any staker (including the validator) can bond or unbond from the validator.\n * When the validator is closed to new stakers, existing stakers can still bond or unbond from the validator, but new stakers cannot bond.\n *\n * This function serves two primary purposes:\n * 1. Allow a validator to leave the committee, by closing themselves to stakers and then unbonding all of their stakers.\n * 2. Allow a validator to maintain their % of stake, by closing themselves to allowing more stakers to bond to them.\n *\n * @example\n * // Create a keyProvider to handle key management\n * const keyProvider = new AleoKeyProvider();\n * keyProvider.useCache = true;\n *\n * // Create a new ProgramManager with the key that will be used to bond credits\n * const programManager = new ProgramManager(\"https://api.explorer.aleo.org/v1\", keyProvider, undefined);\n * programManager.setAccount(new Account(\"ValidatorPrivateKey\"));\n *\n * // Create the bonding transaction\n * const tx_id = await programManager.setValidatorState(true);\n *\n * @returns string\n * @param {boolean} validator_state\n * @param {Partial} options - Override default execution options\n */\n async setValidatorState(validator_state: boolean, options: Partial = {}) {\n const tx = await this.buildSetValidatorStateTransaction(validator_state, options);\n return this.networkClient.submitTransaction(tx);\n }\n\n /**\n * Verify a proof of execution from an offline execution\n *\n * @param {executionResponse} executionResponse\n * @returns {boolean} True if the proof is valid, false otherwise\n */\n verifyExecution(executionResponse: ExecutionResponse): boolean {\n try {\n const execution = executionResponse.getExecution();\n const function_id = executionResponse.getFunctionId();\n const program = executionResponse.getProgram();\n const verifyingKey = executionResponse.getVerifyingKey();\n return verifyFunctionExecution(execution, verifyingKey, program, function_id);\n } catch(e) {\n console.warn(\"The execution was not found in the response, cannot verify the execution\");\n return false;\n }\n }\n\n /**\n * Create a program object from a program's source code\n *\n * @param {string} program Program source code\n * @returns {Program | Error} The program object\n */\n createProgramFromSource(program: string): Program | Error {\n return Program.fromString(program);\n }\n\n /**\n * Get the credits program object\n *\n * @returns {Program} The credits program object\n */\n creditsProgram(): Program {\n return Program.getCreditsProgram();\n }\n\n /**\n * Verify a program is valid\n *\n * @param {string} program The program source code\n */\n verifyProgram(program: string): boolean {\n try {\n Program.fromString(program);\n return true;\n } catch (e) {\n return false;\n }\n }\n\n // Internal utility function for getting a credits.aleo record\n async getCreditsRecord(amount: number, nonces: string[], record?: RecordPlaintext | string, params?: RecordSearchParams): Promise {\n try {\n return record instanceof RecordPlaintext ? record : RecordPlaintext.fromString(record);\n } catch (e) {\n try {\n const recordProvider = this.recordProvider;\n return (await recordProvider.findCreditsRecord(amount, true, nonces, params))\n } catch (e) {\n throw logAndThrow(`Error finding fee record. Record finder response: '${e}'. Please ensure you're connected to a valid Aleo network and a record with enough balance exists.`);\n }\n }\n }\n}\n\n// Ensure the transfer type requires an amount record\nfunction requiresAmountRecord(transferType: string): boolean {\n return PRIVATE_TRANSFER_TYPES.has(transferType);\n}\n\n// Validate the transfer type\nfunction validateTransferType(transferType: string): string | Error {\n return VALID_TRANSFER_TYPES.has(transferType) ? transferType :\n logAndThrow(`Invalid transfer type '${transferType}'. Valid transfer types are 'private', 'privateToPublic', 'public', and 'publicToPrivate'.`);\n}\n\nexport { ProgramManager }\n","import {VerifyingKey, Metadata} from \"@provablehq/wasm\";\n\nconst KEY_STORE = Metadata.baseUrl();\n\ninterface Key {\n name: string,\n locator: string,\n prover: string,\n verifier: string,\n verifyingKey: () => VerifyingKey,\n}\n\nfunction convert(metadata: Metadata): Key {\n // This looks up the method name in VerifyingKey\n const verifyingKey = (VerifyingKey as any)[metadata.verifyingKey];\n\n if (!verifyingKey) {\n throw new Error(\"Invalid method name: \" + metadata.verifyingKey);\n }\n\n return {\n name: metadata.name,\n locator: metadata.locator,\n prover: metadata.prover,\n verifier: metadata.verifier,\n verifyingKey,\n };\n}\n\nconst CREDITS_PROGRAM_KEYS = {\n bond_public: convert(Metadata.bond_public()),\n bond_validator: convert(Metadata.bond_validator()),\n claim_unbond_public: convert(Metadata.claim_unbond_public()),\n fee_private: convert(Metadata.fee_private()),\n fee_public: convert(Metadata.fee_public()),\n inclusion: convert(Metadata.inclusion()),\n join: convert(Metadata.join()),\n set_validator_state: convert(Metadata.set_validator_state()),\n split: convert(Metadata.split()),\n transfer_private: convert(Metadata.transfer_private()),\n transfer_private_to_public: convert(Metadata.transfer_private_to_public()),\n transfer_public: convert(Metadata.transfer_public()),\n transfer_public_as_signer: convert(Metadata.transfer_public_as_signer()),\n transfer_public_to_private: convert(Metadata.transfer_public_to_private()),\n unbond_public: convert(Metadata.unbond_public()),\n getKey: function(key: string): Key | Error {\n if (this.hasOwnProperty(key)) {\n return (this as any)[key] as Key;\n } else {\n return new Error(`Key \"${key}\" not found.`);\n }\n }\n};\n\nconst PRIVATE_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n]);\nconst VALID_TRANSFER_TYPES = new Set([\n \"transfer_private\",\n \"private\",\n \"transferPrivate\",\n \"transfer_private_to_public\",\n \"privateToPublic\",\n \"transferPrivateToPublic\",\n \"transfer_public\",\n \"transfer_public_as_signer\",\n \"public\",\n \"public_as_signer\",\n \"transferPublic\",\n \"transferPublicAsSigner\",\n \"transfer_public_to_private\",\n \"publicToPrivate\",\n \"publicAsSigner\",\n \"transferPublicToPrivate\",\n]);\nconst PRIVATE_TRANSFER = new Set([\n \"private\",\n \"transfer_private\",\n \"transferPrivate\",\n]);\nconst PRIVATE_TO_PUBLIC_TRANSFER = new Set([\n \"private_to_public\",\n \"privateToPublic\",\n \"transfer_private_to_public\",\n \"transferPrivateToPublic\",\n]);\nconst PUBLIC_TRANSFER = new Set([\n \"public\",\n \"transfer_public\",\n \"transferPublic\",\n]);\nconst PUBLIC_TRANSFER_AS_SIGNER = new Set([\n \"public_as_signer\",\n \"transfer_public_as_signer\",\n \"transferPublicAsSigner\",\n]);\nconst PUBLIC_TO_PRIVATE_TRANSFER = new Set([\n \"public_to_private\",\n \"publicToPrivate\",\n \"transfer_public_to_private\",\n \"transferPublicToPrivate\",\n]);\n\nfunction logAndThrow(message: string): Error {\n console.error(message);\n throw message;\n}\n\nimport { Account } from \"./account\";\nimport { AleoNetworkClient, ProgramImports } from \"./network-client\";\nimport { Block } from \"./models/block\";\nimport { Execution } from \"./models/execution\";\nimport { Input } from \"./models/input\";\nimport { Output } from \"./models/output\";\nimport { TransactionModel } from \"./models/transactionModel\";\nimport { Transition } from \"./models/transition\";\nimport {\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n CachedKeyPair,\n FunctionKeyPair,\n FunctionKeyProvider,\n KeySearchParams,\n} from \"./function-key-provider\";\nimport {\n OfflineKeyProvider,\n OfflineSearchParams\n} from \"./offline-key-provider\";\nimport {\n BlockHeightSearch,\n NetworkRecordProvider,\n RecordProvider,\n RecordSearchParams,\n} from \"./record-provider\";\n\n// @TODO: This function is no longer needed, remove it.\nasync function initializeWasm() {\n console.warn(\"initializeWasm is deprecated, you no longer need to use it\");\n}\n\nexport { createAleoWorker } from \"./managed-worker\";\n\nexport { ProgramManager } from \"./program-manager\";\n\nexport {\n Address,\n Execution as FunctionExecution,\n ExecutionResponse,\n Field,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProgramManager as ProgramManagerBase,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n Signature,\n Transaction,\n VerifyingKey,\n ViewKey,\n initThreadPool,\n verifyFunctionExecution,\n} from \"@provablehq/wasm\";\n\nexport { initializeWasm };\n\nexport {\n Account,\n AleoKeyProvider,\n AleoKeyProviderParams,\n AleoKeyProviderInitParams,\n AleoNetworkClient,\n Block,\n BlockHeightSearch,\n CachedKeyPair,\n Execution,\n FunctionKeyPair,\n FunctionKeyProvider,\n Input,\n Key,\n KeySearchParams,\n NetworkRecordProvider,\n ProgramImports,\n OfflineKeyProvider,\n OfflineSearchParams,\n Output,\n RecordProvider,\n RecordSearchParams,\n TransactionModel,\n Transition,\n CREDITS_PROGRAM_KEYS,\n KEY_STORE,\n PRIVATE_TRANSFER,\n PRIVATE_TO_PUBLIC_TRANSFER,\n PRIVATE_TRANSFER_TYPES,\n PUBLIC_TRANSFER,\n PUBLIC_TRANSFER_AS_SIGNER,\n PUBLIC_TO_PRIVATE_TRANSFER,\n VALID_TRANSFER_TYPES,\n logAndThrow,\n};\n","import {initThreadPool, ProgramManager, PrivateKey, verifyFunctionExecution, FunctionKeyPair} from \"./index\";\nimport { AleoKeyProvider, AleoKeyProviderParams} from \"./function-key-provider\";\nimport { expose } from \"comlink\";\n\nawait initThreadPool();\n\nconst defaultHost = \"https://api.explorer.aleo.org/v1\";\nconst keyProvider = new AleoKeyProvider();\nconst programManager = new ProgramManager(\n defaultHost,\n keyProvider,\n undefined\n);\n\nkeyProvider.useCache(true);\n\nlet lastLocalProgram: string = \"\";\n\nexport interface WorkerAPI {\n run: (\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string\n ) => Promise<{ outputs: any; execution: string } | string>;\n\n getPrivateKey: () => Promise;\n}\nasync function run(\n localProgram: string,\n aleoFunction: string,\n inputs: string[],\n privateKey: string,\n proveExecution = false\n) {\n console.log(\"Web worker: Executing function locally...\");\n const startTime = performance.now();\n\n try {\n // Ensure the program is valid and that it contains the function specified\n const program = programManager.createProgramFromSource(localProgram);\n if (program instanceof Error) {\n throw \"Error creating program from source\";\n }\n const program_id = program.id();\n if (!program.hasFunction(aleoFunction)) {\n throw `Program ${program_id} does not contain function ${aleoFunction}`;\n }\n const cacheKey = `${program_id}:${aleoFunction}`;\n\n // Get the program imports\n const imports = await programManager.networkClient.getProgramImports(\n localProgram\n );\n\n if (imports instanceof Error) {\n throw \"Error getting program imports\";\n }\n // Get the proving and verifying keys for the function\n if (lastLocalProgram !== localProgram) {\n const keys = await programManager.synthesizeKeys(\n localProgram,\n aleoFunction,\n inputs,\n PrivateKey.from_string(privateKey)\n );\n programManager.keyProvider.cacheKeys(cacheKey, keys);\n lastLocalProgram = localProgram;\n }\n\n // Pass the cache key to the execute function\n const keyParams = new AleoKeyProviderParams({\n cacheKey: cacheKey,\n });\n\n // Execute the function locally\n const response = await programManager.run(\n localProgram,\n aleoFunction,\n inputs,\n proveExecution,\n imports,\n keyParams,\n undefined,\n undefined,\n PrivateKey.from_string(privateKey),\n );\n\n // Return the outputs to the main thread\n console.log(\n `Web worker: Local execution completed in ${\n performance.now() - startTime\n } ms`\n );\n const outputs = response.getOutputs();\n const execution = response.getExecution();\n let executionString = \"\";\n\n const keys = keyProvider.getKeys(cacheKey);\n\n if (keys instanceof Error) {\n throw \"Could not get verifying key\";\n }\n\n const verifyingKey = keys[1];\n\n if (execution) {\n verifyFunctionExecution(\n execution,\n verifyingKey,\n program,\n \"hello\"\n );\n executionString = execution.toString();\n console.log(\"Execution verified successfully: \" + execution);\n } else {\n executionString = \"\";\n }\n\n console.log(`Function execution response: ${outputs}`);\n\n return { outputs: outputs, execution: executionString };\n } catch (error) {\n console.error(error);\n return error ? error.toString() : \"Unknown error\";\n }\n}\n\nasync function getPrivateKey() {\n const privateKey = new PrivateKey();\n return privateKey.to_string();\n}\n\nconst workerAPI = { run, getPrivateKey };\nexpose(workerAPI);\n"],"names":["proxyMarker","Symbol","createEndpoint","releaseProxy","finalizer","throwMarker","isObject","val","transferHandlers","Map","canHandle","serialize","obj","port1","port2","MessageChannel","expose","deserialize","port","start","createProxy","target","value","serialized","Error","isError","message","name","stack","Object","assign","ep","globalThis","allowedOrigins","addEventListener","callback","ev","data","origin","allowedOrigin","RegExp","test","isAllowedOrigin","console","warn","id","type","path","argumentList","map","fromWireValue","returnValue","parent","slice","reduce","prop","rawValue","apply","proxy","transfers","transferCache","set","transfer","undefined","Promise","resolve","catch","then","wireValue","transferables","toWireValue","postMessage","removeEventListener","closeEndPoint","error","TypeError","endpoint","constructor","isMessagePort","close","throwIfProxyReleased","isReleased","releaseEndpoint","requestResponseMessage","proxyCounter","WeakMap","proxyFinalizers","FinalizationRegistry","newCount","get","isProxyReleased","Proxy","_target","unregister","unregisterProxy","length","r","p","toString","bind","_thisArg","rawArgumentList","last","processArguments","construct","register","registerProxy","processed","v","arr","Array","prototype","concat","handler","serializedValue","msg","fill","Math","floor","random","Number","MAX_SAFE_INTEGER","join","l","async","url","options","response","fetch","ok","status","post","method","AleoNetworkClient","host","headers","account","this","setAccount","getAccount","setHost","fetchData","json","findUnspentRecords","startHeight","endHeight","privateKey","amounts","maxMicrocredits","nonces","records","end","resolvedPrivateKey","latestHeight","failures","totalRecordValue","BigInt","_privateKey","PrivateKey","from_string","viewKey","to_view_key","blockHeight","getLatestHeight","blocks","getBlockRange","i","transactions","j","confirmedTransaction","transaction","execution","transitions","k","transition","program","outputs","output","record","RecordCiphertext","fromString","isOwner","recordPlaintext","decrypt","nonce","includes","serialNumber","serialNumberString","getTransitionId","push","microcredits","amounts_found","getBlock","height","getDeploymentTransactionIDForProgram","Program","replace","getDeploymentTransactionForProgram","transaction_id","getTransaction","getLatestBlock","getLatestCommittee","getProgram","programId","getProgramObject","inputProgram","getProgramImports","imports","importList","getImports","import_id","hasOwnProperty","programSource","nestedImports","key","logAndThrow","getProgramImportNames","getProgramMappingNames","getProgramMappingValue","mappingName","getStateRoot","getTransactions","getTransactionsInMempool","inputOrOutputID","submitTransaction","transaction_string","Transaction","body","AleoKeyProviderParams","proverUri","verifierUri","cacheKey","params","AleoKeyProvider","cache","cacheOption","keyUris","fetchBytes","arrayBuffer","Uint8Array","KEY_STORE","useCache","clearCache","clear","cacheKeys","keyId","keys","provingKey","verifyingKey","toBytes","containsKeys","has","deleteKeys","delete","getKeys","debug","provingKeyBytes","verifyingKeyBytes","ProvingKey","fromBytes","VerifyingKey","functionKeys","proverUrl","verifierUrl","CREDITS_PROGRAM_KEYS","getKey","fetchCreditsKeys","fetchRemoteKeys","getVerifyingKey","fetchProvingKey","locator","keyPair","verifying_key","proving_key","prover","bond_public","bondPublicKeys","bondValidatorKeys","bond_validator","claimUnbondPublicKeys","claim_unbond_public","transferKeys","visibility","PRIVATE_TRANSFER","transfer_private","PRIVATE_TO_PUBLIC_TRANSFER","transfer_private_to_public","PUBLIC_TRANSFER","transfer_public","PUBLIC_TRANSFER_AS_SIGNER","transfer_public_as_signer","PUBLIC_TO_PRIVATE_TRANSFER","transfer_public_to_private","joinKeys","splitKeys","split","feePrivateKeys","fee_private","feePublicKeys","fee_public","verifier","inclusion","set_validator_state","unbond_public","text","e","inner","unBondPublicKeys","ProgramManager","keyProvider","networkClient","recordProvider","setKeyProvider","setRecordProvider","deploy","fee","privateFee","recordSearchParams","feeRecord","programObject","log","feeKeys","deploymentPrivateKey","getCreditsRecord","feeProvingKey","feeVerifyingKey","tx","ProgramManager$1","buildDeploymentTransaction","buildExecutionTransaction","programName","functionName","inputs","keySearchParams","offlineQuery","executionPrivateKey","execute","run","function_name","proveExecution","executeFunctionOffline","recordOne","recordTwo","joinProvingKey","joinVerifyingKey","RecordPlaintext","buildJoinTransaction","splitAmount","amountRecord","splitProvingKey","splitVerifyingKey","buildSplitTransaction","synthesizeKeys","function_id","synthesizeKeyPair","buildTransferTransaction","amount","recipient","transferType","validateTransferType","transferProvingKey","transferVerifyingKey","requiresAmountRecord","buildTransferPublicTransaction","buildTransferPublicAsSignerTransaction","buildBondPublicTransaction","staker_address","validator_address","withdrawal_address","scaledAmount","trunc","creditsProgram","additionalOptions","executeOptions","bondPublic","buildBondValidatorTransaction","commission","adjustedCommission","bondValidator","buildUnbondPublicTransaction","unbondPublic","buildClaimUnbondPublicTransaction","claimUnbondPublic","buildSetValidatorStateTransaction","validator_state","setValidatorState","verifyExecution","executionResponse","getExecution","getFunctionId","verifyFunctionExecution","createProgramFromSource","getCreditsProgram","verifyProgram","findCreditsRecord","PRIVATE_TRANSFER_TYPES","VALID_TRANSFER_TYPES","Metadata","baseUrl","convert","metadata","Set","initThreadPool","defaultHost","programManager","lastLocalProgram","localProgram","aleoFunction","startTime","performance","now","program_id","hasFunction","keyParams","getOutputs","executionString","getPrivateKey","to_string","workerAPI"],"sourceRoot":""} \ No newline at end of file diff --git a/933.bundle.js b/933.bundle.js index 5388cd271..a2b0eb2c1 100644 --- a/933.bundle.js +++ b/933.bundle.js @@ -1,2 +1,2 @@ -(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[933],{2583:(_,t,e)=>{_.exports=e.p+"3ebf0bb8781b6d786343.js"},5934:(_,t,e)=>{_.exports=e.p+"8cbe7e9b06e560a22f36.wasm"},9933:(_,t,e)=>{e.a(_,(async(_,r)=>{try{function n(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}let K;e.d(t,{$r:()=>B_,CK:()=>j,L:()=>W_,PD:()=>q_,SF:()=>j_,XV:()=>J_,YW:()=>N_,_q:()=>E_,fW:()=>I_,hz:()=>L_,zW:()=>U_});const C=new Array(128).fill(void 0);function i(_){return C[_]}C.push(void 0,null,!0,!1);let E=C.length;function o(_){_<132||(C[_]=E,E=_)}function a(_){const t=i(_);return o(_),t}const M="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&M.decode();let B=null;function s(){return null!==B&&B.buffer===K.memory.buffer||(B=new Uint8Array(K.memory.buffer)),B}function c(_,t){return _>>>=0,M.decode(s().slice(_,_+t))}function g(_){E===C.length&&C.push(C.length+1);const t=E;return E=C[t],C[t]=_,t}let U=0;const I="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},q=function(_,t){const e=I.encode(_);return t.set(e),{read:_.length,written:e.length}};function w(_,t,e){if(void 0===e){const e=I.encode(_),r=t(e.length,1)>>>0;return s().subarray(r,r+e.length).set(e),U=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=s();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=s().subarray(n+o,n+r);o+=q(_,t).written,n=e(n,r,o,1)>>>0}return U=o,n}function d(_){return null==_}let W=null;function b(){return null!==W&&W.buffer===K.memory.buffer||(W=new Int32Array(K.memory.buffer)),W}function l(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=l(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const $="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>{K.__wbindgen_export_3.get(_.dtor)(_.a,_.b)}));function u(_,t,e,r){const n={a:_,b:t,cnt:1,dtor:e},i=(..._)=>{n.cnt++;const t=n.a;n.a=0;try{return r(t,n.b,..._)}finally{0==--n.cnt?(K.__wbindgen_export_3.get(n.dtor)(t,n.b),$.unregister(n)):n.a=t}};return i.original=n,$.register(i,n,n),i}function f(_,t,e){K._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(_,t,g(e))}function p(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function y(_,t){const e=t(1*_.length,1)>>>0;return s().set(_,e/1),U=_.length,e}function m(_,t,e,r){try{const o=K.__wbindgen_add_to_stack_pointer(-16);p(_,H),p(t,S_),p(e,g_);const s=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.verifyFunctionExecution(o,_.__wbg_ptr,t.__wbg_ptr,e.__wbg_ptr,s,c);var n=b()[o/4+0],i=b()[o/4+1];if(b()[o/4+2])throw a(i);return 0!==n}finally{K.__wbindgen_add_to_stack_pointer(16)}}let N=null;function h(){return null!==N&&N.buffer===K.memory.buffer||(N=new BigInt64Array(K.memory.buffer)),N}function v(_,t){return _>>>=0,s().subarray(_/1,_/1+t)}function k(_){K.runRayonThread(_)}function P(_,t){return a(K.initThreadPool(g(_),t))}function S(_,t){try{return _.apply(this,t)}catch(_){K.__wbindgen_exn_store(g(_))}}function x(_,t,e,r){K.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(_,t,g(e),g(r))}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_address_free(_>>>0)));let J=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,D.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_address_free(_)}static from_private_key(t){p(t,o_);const e=K.address_from_private_key(t.__wbg_ptr);return _.__wrap(e)}static from_view_key(t){p(t,V_);const e=K.address_from_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.address_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.address_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}verify(_,t){const e=y(_,K.__wbindgen_malloc),r=U;p(t,h_);return 0!==K.address_verify(this.__wbg_ptr,e,r,t.__wbg_ptr)}};const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_execution_free(_>>>0)));let H=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,L.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_execution_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.execution_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.execution_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_executionresponse_free(_>>>0)));let X=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Q.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Q.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_executionresponse_free(_)}getOutputs(){return a(K.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const _=K.executionresponse_getExecution(this.__wbg_ptr);return 0===_?void 0:H.__wrap(_)}getKeys(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getKeys(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return __.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const _=K.executionresponse_getProvingKey(this.__wbg_ptr);return 0===_?void 0:l_.__wrap(_)}getVerifyingKey(){const _=K.executionresponse_getVerifyingKey(this.__wbg_ptr);return S_.__wrap(_)}getFunctionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getFunctionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}getProgram(){const _=K.executionresponse_getProgram(this.__wbg_ptr);return g_.__wrap(_)}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_field_free(_>>>0)));let G=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Y.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_field_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.field_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.field_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_keypair_free(_>>>0)));class __{static __wrap(_){_>>>=0;const t=Object.create(__.prototype);return t.__wbg_ptr=_,Z.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_keypair_free(_)}constructor(_,t){p(_,l_);var e=_.__destroy_into_raw();p(t,S_);var r=t.__destroy_into_raw();const n=K.keypair_new(e,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_provingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return l_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_verifyingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return S_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}}const t_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_metadata_free(_>>>0)));let e_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,t_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,t_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_metadata_free(_)}get name(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_name(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set name(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_name(this.__wbg_ptr,t,e)}get locator(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_locator(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set locator(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_locator(this.__wbg_ptr,t,e)}get prover(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_prover(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set prover(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_prover(this.__wbg_ptr,t,e)}get verifier(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifier(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifier(this.__wbg_ptr,t,e)}get verifyingKey(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifyingKey(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,e)}static baseUrl(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.metadata_baseUrl(n);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static bond_public(){const t=K.metadata_bond_public();return _.__wrap(t)}static bond_validator(){const t=K.metadata_bond_validator();return _.__wrap(t)}static claim_unbond_public(){const t=K.metadata_claim_unbond_public();return _.__wrap(t)}static fee_private(){const t=K.metadata_fee_private();return _.__wrap(t)}static fee_public(){const t=K.metadata_fee_public();return _.__wrap(t)}static inclusion(){const t=K.metadata_inclusion();return _.__wrap(t)}static join(){const t=K.metadata_join();return _.__wrap(t)}static set_validator_state(){const t=K.metadata_set_validator_state();return _.__wrap(t)}static split(){const t=K.metadata_split();return _.__wrap(t)}static transfer_private(){const t=K.metadata_transfer_private();return _.__wrap(t)}static transfer_private_to_public(){const t=K.metadata_transfer_private_to_public();return _.__wrap(t)}static transfer_public(){const t=K.metadata_transfer_public();return _.__wrap(t)}static transfer_public_as_signer(){const t=K.metadata_transfer_public_as_signer();return _.__wrap(t)}static transfer_public_to_private(){const t=K.metadata_transfer_public_to_private();return _.__wrap(t)}static unbond_public(){const t=K.metadata_unbond_public();return _.__wrap(t)}};const r_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_offlinequery_free(_>>>0)));let n_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,r_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,r_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_offlinequery_free(_)}constructor(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.offlinequery_new(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return this.__wbg_ptr=t>>>0,this}finally{K.__wbindgen_add_to_stack_pointer(16)}}addStatePath(_,t){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U,o=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,o,s);var e=b()[r/4+0];if(b()[r/4+1])throw a(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.offlinequery_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.offlinequery_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const i_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekey_free(_>>>0)));let o_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,i_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,i_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekey_free(_)}constructor(){const _=K.privatekey_new();return this.__wbg_ptr=_>>>0,this}static from_seed_unchecked(t){const e=y(t,K.__wbindgen_malloc),r=U,n=K.privatekey_from_seed_unchecked(e,r);return _.__wrap(n)}static from_string(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekey_from_string(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_view_key(){const _=K.privatekey_to_view_key(this.__wbg_ptr);return V_.__wrap(_)}to_address(){const _=K.privatekey_to_address(this.__wbg_ptr);return J.__wrap(_)}sign(_){const t=y(_,K.__wbindgen_malloc),e=U,r=K.privatekey_sign(this.__wbg_ptr,t,e);return h_.__wrap(r)}static newEncrypted(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_newEncrypted(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,s_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_fromPrivateKeyCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const a_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekeyciphertext_free(_>>>0)));let s_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,a_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,a_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekeyciphertext_free(_)}static encryptPrivateKey(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,o_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_toCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return o_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekeyciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekeyciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const c_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_program_free(_>>>0)));let g_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,c_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,c_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_program_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.program_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}hasFunction(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;return 0!==K.program_hasFunction(this.__wbg_ptr,t,e)}getFunctions(){return a(K.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_getMappings(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return a(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getRecordMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getStructMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=K.program_getCreditsProgram();return _.__wrap(t)}id(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_id(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}address(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_address(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return J.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){p(t,_);return 0!==K.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return a(K.program_getImports(this.__wbg_ptr))}};const w_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_programmanager_free(_>>>0)));let d_=class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,w_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_programmanager_free(_)}static buildDeploymentTransaction(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U;let u=0;d(r)||(p(r,y_),u=r.__destroy_into_raw());var f=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U;let m=0;d(o)||(p(o,l_),m=o.__destroy_into_raw());let h=0;d(s)||(p(s,S_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,n_),v=c.__destroy_into_raw());return a(K.programmanager_buildDeploymentTransaction(_.__wbg_ptr,b,l,e,u,f,y,d(i)?0:g(i),m,h,v))}static estimateDeploymentFee(_,t){const e=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;return a(K.programmanager_estimateDeploymentFee(e,r,d(t)?0:g(t)))}static estimateProgramNameCost(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.programmanager_estimateProgramNameCost(r,n,i);var t=h()[r/8+0],e=b()[r/4+2];if(b()[r/4+3])throw a(e);return BigInt.asUintN(64,t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(_,t,e,r,n,i,o,s,c,b,l){p(_,o_);const u=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U,y=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(s)||(p(s,l_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,S_),v=c.__destroy_into_raw());var k=d(b)?0:w(b,K.__wbindgen_malloc,K.__wbindgen_realloc),P=U;let S=0;d(l)||(p(l,n_),S=l.__destroy_into_raw());return a(K.programmanager_executeFunctionOffline(_.__wbg_ptr,u,f,y,m,g(r),n,i,d(o)?0:g(o),h,v,k,P,S))}static buildExecutionTransaction(_,t,e,r,n,i,o,s,c,b,l,u,f){p(_,o_);const y=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U,h=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),v=U;let k=0;d(i)||(p(i,y_),k=i.__destroy_into_raw());var P=d(o)?0:w(o,K.__wbindgen_malloc,K.__wbindgen_realloc),S=U;let x=0;d(c)||(p(c,l_),x=c.__destroy_into_raw());let V=0;d(b)||(p(b,S_),V=b.__destroy_into_raw());let F=0;d(l)||(p(l,l_),F=l.__destroy_into_raw());let T=0;d(u)||(p(u,S_),T=u.__destroy_into_raw());let R=0;d(f)||(p(f,n_),R=f.__destroy_into_raw());return a(K.programmanager_buildExecutionTransaction(_.__wbg_ptr,y,m,h,v,g(r),n,k,P,S,d(s)?0:g(s),x,V,F,T,R))}static estimateExecutionFee(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U,u=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U;var y=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,n_),k=c.__destroy_into_raw());return a(K.programmanager_estimateExecutionFee(_.__wbg_ptr,b,l,u,f,g(r),y,m,d(i)?0:g(i),h,v,k))}static estimateFinalizeFee(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.programmanager_estimateFinalizeFee(n,i,o,s,c);var e=h()[n/8+0],r=b()[n/4+2];if(b()[n/4+3])throw a(r);return BigInt.asUintN(64,e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(_,t,e,r,n,i,o,s,c,g,b){p(_,o_),p(t,y_);var l=t.__destroy_into_raw();p(e,y_);var u=e.__destroy_into_raw();let f=0;d(n)||(p(n,y_),f=n.__destroy_into_raw());var y=d(i)?0:w(i,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,l_),k=c.__destroy_into_raw());let P=0;d(g)||(p(g,S_),P=g.__destroy_into_raw());let S=0;d(b)||(p(b,n_),S=b.__destroy_into_raw());return a(K.programmanager_buildJoinTransaction(_.__wbg_ptr,l,u,r,f,y,m,h,v,k,P,S))}static buildSplitTransaction(_,t,e,r,n,i,o){p(_,o_),p(e,y_);var s=e.__destroy_into_raw(),c=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),g=U;let b=0;d(n)||(p(n,l_),b=n.__destroy_into_raw());let l=0;d(i)||(p(i,S_),l=i.__destroy_into_raw());let u=0;d(o)||(p(o,n_),u=o.__destroy_into_raw());return a(K.programmanager_buildSplitTransaction(_.__wbg_ptr,t,s,c,g,b,l,u))}static buildTransferTransaction(_,t,e,r,n,i,o,s,c,g,b,l,u){p(_,o_);const f=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U,m=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),h=U;let v=0;d(n)||(p(n,y_),v=n.__destroy_into_raw());let k=0;d(o)||(p(o,y_),k=o.__destroy_into_raw());var P=d(s)?0:w(s,K.__wbindgen_malloc,K.__wbindgen_realloc),S=U;let x=0;d(c)||(p(c,l_),x=c.__destroy_into_raw());let V=0;d(g)||(p(g,S_),V=g.__destroy_into_raw());let F=0;d(b)||(p(b,l_),F=b.__destroy_into_raw());let T=0;d(l)||(p(l,S_),T=l.__destroy_into_raw());let R=0;d(u)||(p(u,n_),R=u.__destroy_into_raw());return a(K.programmanager_buildTransferTransaction(_.__wbg_ptr,t,f,y,m,h,v,i,k,P,S,x,V,F,T,R))}static synthesizeKeyPair(_,t,e,r,n){p(_,o_);const i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;return a(K.programmanager_synthesizeKeyPair(_.__wbg_ptr,i,o,s,c,g(r),d(n)?0:g(n)))}};const b_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_provingkey_free(_>>>0)));let l_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,b_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,b_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_provingkey_free(_)}isBondPublicProver(){return 0!==K.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==K.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==K.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==K.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==K.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==K.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==K.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==K.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==K.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==K.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==K.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==K.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==K.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==K.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==K.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.provingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.provingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.provingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const u_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordciphertext_free(_>>>0)));let f_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,u_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,u_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordciphertext_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}decrypt(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16);p(_,V_),K.recordciphertext_decrypt(r,this.__wbg_ptr,_.__wbg_ptr);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return y_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isOwner(_){p(_,V_);return 0!==K.recordciphertext_isOwner(this.__wbg_ptr,_.__wbg_ptr)}};const p_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordplaintext_free(_>>>0)));let y_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,p_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,p_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordplaintext_free(_)}commitment(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.recordplaintext_commitment(n,this.__wbg_ptr,i,o,s,c);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return G.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordplaintext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}microcredits(){const _=K.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,_)}nonce(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_nonce(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}serialNumberString(_,t,e){let r,n;try{const u=K.__wbindgen_add_to_stack_pointer(-16);p(_,o_);const f=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U,m=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),h=U;K.recordplaintext_serialNumberString(u,this.__wbg_ptr,_.__wbg_ptr,f,y,m,h);var i=b()[u/4+0],o=b()[u/4+1],s=b()[u/4+2],g=b()[u/4+3],d=i,l=o;if(g)throw d=0,l=0,a(s);return r=d,n=l,c(d,l)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(r,n,1)}}};const m_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_signature_free(_>>>0)));let h_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,m_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,m_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_signature_free(_)}static sign(t,e){p(t,o_);const r=y(e,K.__wbindgen_malloc),n=U,i=K.privatekey_sign(t.__wbg_ptr,r,n);return _.__wrap(i)}verify(_,t){p(_,J);const e=y(t,K.__wbindgen_malloc),r=U;return 0!==K.signature_verify(this.__wbg_ptr,_.__wbg_ptr,e,r)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.signature_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.signature_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const v_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_transaction_free(_>>>0)));let k_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,v_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,v_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_transaction_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.transaction_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionType(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionType(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const P_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_verifyingkey_free(_>>>0)));let S_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,P_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,P_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_verifyingkey_free(_)}static bondPublicVerifier(){const t=K.verifyingkey_bondPublicVerifier();return _.__wrap(t)}static bondValidatorVerifier(){const t=K.verifyingkey_bondValidatorVerifier();return _.__wrap(t)}static claimUnbondPublicVerifier(){const t=K.verifyingkey_claimUnbondPublicVerifier();return _.__wrap(t)}static feePrivateVerifier(){const t=K.verifyingkey_feePrivateVerifier();return _.__wrap(t)}static feePublicVerifier(){const t=K.verifyingkey_feePublicVerifier();return _.__wrap(t)}static inclusionVerifier(){const t=K.verifyingkey_inclusionVerifier();return _.__wrap(t)}static joinVerifier(){const t=K.verifyingkey_joinVerifier();return _.__wrap(t)}static setValidatorStateVerifier(){const t=K.verifyingkey_setValidatorStateVerifier();return _.__wrap(t)}static splitVerifier(){const t=K.verifyingkey_splitVerifier();return _.__wrap(t)}static transferPrivateVerifier(){const t=K.verifyingkey_transferPrivateVerifier();return _.__wrap(t)}static transferPrivateToPublicVerifier(){const t=K.verifyingkey_transferPrivateToPublicVerifier();return _.__wrap(t)}static transferPublicVerifier(){const t=K.verifyingkey_transferPublicVerifier();return _.__wrap(t)}static transferPublicAsSignerVerifier(){const t=K.verifyingkey_transferPublicAsSignerVerifier();return _.__wrap(t)}static transferPublicToPrivateVerifier(){const t=K.verifyingkey_transferPublicToPrivateVerifier();return _.__wrap(t)}static unbondPublicVerifier(){const t=K.verifyingkey_unbondPublicVerifier();return _.__wrap(t)}isBondPublicVerifier(){return 0!==K.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==K.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==K.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==K.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==K.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==K.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==K.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==K.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==K.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==K.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==K.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==K.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==K.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==K.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==K.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.verifyingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.verifyingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.verifyingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const x_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_viewkey_free(_>>>0)));let V_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,x_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,x_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_viewkey_free(_)}static from_private_key(t){p(t,o_);const e=K.privatekey_to_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.viewkey_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.viewkey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_address(){const _=K.address_from_view_key(this.__wbg_ptr);return J.__wrap(_)}decrypt(_){let t,e;try{const d=K.__wbindgen_add_to_stack_pointer(-16),l=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),u=U;K.viewkey_decrypt(d,this.__wbg_ptr,l,u);var r=b()[d/4+0],n=b()[d/4+1],i=b()[d/4+2],o=b()[d/4+3],s=r,g=n;if(o)throw s=0,g=0,a(i);return t=s,e=g,c(s,g)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(t,e,1)}}};async function V(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}function F(){const _={wbg:{}};return _.wbg.__wbindgen_object_drop_ref=function(_){a(_)},_.wbg.__wbg_new_71801a555ad9f2aa=function(){return S((function(){return g(new XMLHttpRequest)}),arguments)},_.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return S((function(_,t,e){i(_).overrideMimeType(c(t,e))}),arguments)},_.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return S((function(_,t,e,r,n,o){i(_).open(c(t,e),c(r,n),0!==o)}),arguments)},_.wbg.__wbg_send_80d29985093c1ec5=function(){return S((function(_){i(_).send()}),arguments)},_.wbg.__wbg_response_7c2e2759084f7279=function(){return S((function(_){return g(i(_).response)}),arguments)},_.wbg.__wbg_status_d485fb5a478426fb=function(){return S((function(_){return i(_).status}),arguments)},_.wbg.__wbg_new_72fb9a18b5ae2624=function(){return g(new Object)},_.wbg.__wbindgen_string_new=function(_,t){return g(c(_,t))},_.wbg.__wbg_set_1f9b04f170055d33=function(){return S((function(_,t,e){return Reflect.set(i(_),i(t),i(e))}),arguments)},_.wbg.__wbg_new_ab6fd82b10560829=function(){return S((function(){return g(new Headers)}),arguments)},_.wbg.__wbindgen_object_clone_ref=function(_){return g(i(_))},_.wbg.__wbg_new_0d76b0581eca6298=function(){return S((function(){return g(new AbortController)}),arguments)},_.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return g(i(_).signal)},_.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return S((function(_,t,e,r,n){i(_).append(c(t,e),c(r,n))}),arguments)},_.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=i(_)instanceof Response}catch(_){t=!1}return t},_.wbg.__wbg_status_61a01141acd3cf74=function(_){return i(_).status},_.wbg.__wbg_url_5f6dc4009ac5f99d=function(_,t){const e=w(i(t).url,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_headers_9620bfada380764a=function(_){return g(i(_).headers)},_.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return g(Symbol.iterator)},_.wbg.__wbg_get_e3c254076557e348=function(){return S((function(_,t){return g(Reflect.get(i(_),i(t)))}),arguments)},_.wbg.__wbindgen_is_function=function(_){return"function"==typeof i(_)},_.wbg.__wbg_call_27c0f87801dedf93=function(){return S((function(_,t){return g(i(_).call(i(t)))}),arguments)},_.wbg.__wbindgen_is_object=function(_){const t=i(_);return"object"==typeof t&&null!==t},_.wbg.__wbg_next_40fc327bfc8770e6=function(_){return g(i(_).next)},_.wbg.__wbg_next_196c84450b364254=function(){return S((function(_){return g(i(_).next())}),arguments)},_.wbg.__wbg_done_298b57d23c0fc80c=function(_){return i(_).done},_.wbg.__wbg_value_d93c65011f51a456=function(_){return g(i(_).value)},_.wbg.__wbg_abort_2aa7521d5690750e=function(_){i(_).abort()},_.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return S((function(_){return g(JSON.stringify(i(_)))}),arguments)},_.wbg.__wbindgen_string_get=function(_,t){const e=i(t),r="string"==typeof e?e:void 0;var n=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;b()[_/4+1]=o,b()[_/4+0]=n},_.wbg.__wbg_executionresponse_new=function(_){return g(X.__wrap(_))},_.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return S((function(_,t,e){return g(i(_).call(i(t),i(e)))}),arguments)},_.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(c(_,t))},_.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return g(new Array(_>>>0))},_.wbg.__wbg_set_d4638f722068f043=function(_,t,e){i(_)[t>>>0]=a(e)},_.wbg.__wbg_transaction_new=function(_){return g(k_.__wrap(_))},_.wbg.__wbindgen_bigint_from_u64=function(_){return g(BigInt.asUintN(64,_))},_.wbg.__wbg_keypair_new=function(_){return g(__.__wrap(_))},_.wbg.__wbindgen_module=function(){return g(A.__wbindgen_wasm_module)},_.wbg.__wbindgen_memory=function(){return g(K.memory)},_.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,e,r){return g(n(i(_),i(t),i(e),r>>>0))},_.wbg.__wbindgen_cb_drop=function(_){const t=a(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},_.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return g(new Array)},_.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return i(_).push(i(t))},_.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return S((function(_){return g(i(_).arrayBuffer())}),arguments)},_.wbg.__wbg_new_63b92bc8671ed464=function(_){return g(new Uint8Array(i(_)))},_.wbg.__wbg_length_c20a40f15020d68a=function(_){return i(_).length},_.wbg.__wbg_new_81740750da40724f=function(_,t){try{var e={a:_,b:t};const r=new Promise(((_,t)=>{const r=e.a;e.a=0;try{return x(r,e.b,_,t)}finally{e.a=r}}));return g(r)}finally{e.a=e.b=0}},_.wbg.__wbindgen_number_new=function(_){return g(_)},_.wbg.__wbg_new_abda76e883ba8a5f=function(){return g(new Error)},_.wbg.__wbg_stack_658279fe44541cf6=function(_,t){const e=w(i(t).stack,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_error_f851667af71bcfc6=function(_,t){let e,r;try{e=_,r=t,console.error(c(_,t))}finally{K.__wbindgen_free(e,r,1)}},_.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return g(i(_).buffer)},_.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,e){return g(new Uint8Array(i(_),t>>>0,e>>>0))},_.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return S((function(_,t){i(_).randomFillSync(a(t))}),arguments)},_.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,e){return g(i(_).subarray(t>>>0,e>>>0))},_.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return S((function(_,t){i(_).getRandomValues(i(t))}),arguments)},_.wbg.__wbg_set_a47bac70306a19a7=function(_,t,e){i(_).set(i(t),e>>>0)},_.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return g(i(_).crypto)},_.wbg.__wbg_process_4a72847cc503995b=function(_){return g(i(_).process)},_.wbg.__wbg_versions_f686565e586dd935=function(_){return g(i(_).versions)},_.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return g(i(_).node)},_.wbg.__wbindgen_is_string=function(_){return"string"==typeof i(_)},_.wbg.__wbg_require_cca90b1a94a0255b=function(){return S((function(){return g(module.require)}),arguments)},_.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return g(i(_).msCrypto)},_.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return g(new Uint8Array(_>>>0))},_.wbg.__wbg_length_cd7af8117672b8b8=function(_){return i(_).length},_.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return g(i(_)[t>>>0])},_.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return S((function(){return g(self.self)}),arguments)},_.wbg.__wbg_window_c6fb939a7f436783=function(){return S((function(){return g(window.window)}),arguments)},_.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return S((function(){return g(globalThis.globalThis)}),arguments)},_.wbg.__wbg_global_207b558942527489=function(){return S((function(){return g(global.global)}),arguments)},_.wbg.__wbindgen_is_undefined=function(_){return void 0===i(_)},_.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return g(new Function(c(_,t)))},_.wbg.__wbg_has_0af94d20077affa2=function(){return S((function(_,t){return Reflect.has(i(_),i(t))}),arguments)},_.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return g(fetch(i(_)))},_.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return g(i(_).fetch(i(t)))},_.wbg.__wbindgen_debug_string=function(_,t){const e=w(l(i(t)),K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbindgen_throw=function(_,t){throw new Error(c(_,t))},_.wbg.__wbindgen_rethrow=function(_){throw a(_)},_.wbg.__wbg_then_a73caa9a87991566=function(_,t,e){return g(i(_).then(i(t),i(e)))},_.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return g(i(_).then(i(t)))},_.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(i(_))},_.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return g(i(_).queueMicrotask)},_.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return g(Promise.resolve(i(_)))},_.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return g(Atomics.waitAsync)},_.wbg.__wbg_new_8cccba86b0f574cb=function(_){return g(new Int32Array(i(_)))},_.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,e){return g(Atomics.waitAsync(i(_),t,e))},_.wbg.__wbg_async_19c0400d97cc72fe=function(_){return i(_).async},_.wbg.__wbg_value_571d60108110e917=function(_){return g(i(_).value)},_.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(_){const t=w("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;b()[_/4+1]=e,b()[_/4+0]=t},_.wbg.__wbg_new_d1187ae36d662ef9=function(){return S((function(_,t){return g(new Worker(c(_,t)))}),arguments)},_.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){i(_).onmessage=i(t)},_.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,e){return g(Array.of(i(_),i(t),i(e)))},_.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return S((function(_,t){i(_).postMessage(i(t))}),arguments)},_.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return g(i(_).data)},_.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return S((function(_,t,e){return g(new Request(c(_,t),i(e)))}),arguments)},_.wbg.__wbg_responseText_c67ed2d48db10769=function(){return S((function(_,t){const e=i(t).responseText;var r=d(e)?0:w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),n=U;b()[_/4+1]=n,b()[_/4+0]=r}),arguments)},_.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return g(u(_,t,538,f))},_.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return g(u(_,t,538,f))},_}function T(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(_,t){return K=_.exports,A.__wbindgen_wasm_module=t,N=null,W=null,B=null,K.__wbindgen_start(),K}function z(_,t){if(void 0!==K)return K;const e=F();T(e,t),_ instanceof WebAssembly.Module||(_=new WebAssembly.Module(_));return R(new WebAssembly.Instance(_,e),_)}async function A(_,t){if(void 0!==K)return K;const e=F();("string"==typeof _||"function"==typeof Request&&_ instanceof Request||"function"==typeof URL&&_ instanceof URL)&&(_=fetch(_)),T(e,t);const{instance:r,module:n}=await V(await _,e);return R(r,n)}var O=Object.freeze({__proto__:null,Address:J,Execution:H,ExecutionResponse:X,Field:G,KeyPair:__,Metadata:e_,OfflineQuery:n_,PrivateKey:o_,PrivateKeyCiphertext:s_,Program:g_,ProgramManager:d_,ProvingKey:l_,RecordCiphertext:f_,RecordPlaintext:y_,Signature:h_,Transaction:k_,VerifyingKey:S_,ViewKey:V_,default:A,initSync:z,initThreadPool:P,runRayonThread:k,verifyFunctionExecution:m});const F_="assets/aleo_wasm.wasm";const{initThreadPool:T_,Address:R_,Execution:z_,ExecutionResponse:A_,Field:O_,Metadata:j_,OfflineQuery:K_,Private:C_,PrivateKey:E_,PrivateKeyCiphertext:M_,Program:B_,ProvingKey:U_,RecordCiphertext:I_,RecordPlaintext:q_,ProgramManager:W_,Signature:$_,Transaction:N_,ViewKey:D_,VerifyingKey:J_,verifyFunctionExecution:L_}=await(async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n=F_;return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(A,n):await A(n),O})({importHook:()=>new URL(e(5934),e.b)});async function j(_){null==_&&(_=navigator.hardwareConcurrency),console.info(`Spawning ${_} threads`),await T_(new URL(e(2583),e.b),_)}r()}catch(H_){r(H_)}}),1)}}]); +(self.webpackChunkaleo_website=self.webpackChunkaleo_website||[]).push([[933],{2583:(_,t,e)=>{_.exports=e.p+"2d6a4d794221941c07b8.js"},5934:(_,t,e)=>{_.exports=e.p+"58342153fc9a001d7976.wasm"},9933:(_,t,e)=>{e.a(_,(async(_,r)=>{try{function n(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}let K;e.d(t,{$r:()=>B_,CK:()=>j,L:()=>W_,PD:()=>q_,SF:()=>j_,XV:()=>J_,YW:()=>N_,_q:()=>E_,fW:()=>I_,hz:()=>L_,zW:()=>U_});const C=new Array(128).fill(void 0);function i(_){return C[_]}C.push(void 0,null,!0,!1);let E=C.length;function o(_){_<132||(C[_]=E,E=_)}function a(_){const t=i(_);return o(_),t}const M="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&M.decode();let B=null;function s(){return null!==B&&B.buffer===K.memory.buffer||(B=new Uint8Array(K.memory.buffer)),B}function c(_,t){return _>>>=0,M.decode(s().slice(_,_+t))}function g(_){E===C.length&&C.push(C.length+1);const t=E;return E=C[t],C[t]=_,t}let U=0;const I="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},q=function(_,t){const e=I.encode(_);return t.set(e),{read:_.length,written:e.length}};function w(_,t,e){if(void 0===e){const e=I.encode(_),r=t(e.length,1)>>>0;return s().subarray(r,r+e.length).set(e),U=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=s();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=s().subarray(n+o,n+r);o+=q(_,t).written,n=e(n,r,o,1)>>>0}return U=o,n}function d(_){return null==_}let W=null;function b(){return null!==W&&W.buffer===K.memory.buffer||(W=new Int32Array(K.memory.buffer)),W}function l(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=l(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const $="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>{K.__wbindgen_export_3.get(_.dtor)(_.a,_.b)}));function u(_,t,e,r){const n={a:_,b:t,cnt:1,dtor:e},i=(..._)=>{n.cnt++;const t=n.a;n.a=0;try{return r(t,n.b,..._)}finally{0==--n.cnt?(K.__wbindgen_export_3.get(n.dtor)(t,n.b),$.unregister(n)):n.a=t}};return i.original=n,$.register(i,n,n),i}function f(_,t,e){K._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(_,t,g(e))}function p(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function y(_,t){const e=t(1*_.length,1)>>>0;return s().set(_,e/1),U=_.length,e}function m(_,t,e,r){try{const o=K.__wbindgen_add_to_stack_pointer(-16);p(_,H),p(t,S_),p(e,g_);const s=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.verifyFunctionExecution(o,_.__wbg_ptr,t.__wbg_ptr,e.__wbg_ptr,s,c);var n=b()[o/4+0],i=b()[o/4+1];if(b()[o/4+2])throw a(i);return 0!==n}finally{K.__wbindgen_add_to_stack_pointer(16)}}let N=null;function h(){return null!==N&&N.buffer===K.memory.buffer||(N=new BigInt64Array(K.memory.buffer)),N}function v(_,t){return _>>>=0,s().subarray(_/1,_/1+t)}function k(_){K.runRayonThread(_)}function P(_,t){return a(K.initThreadPool(g(_),t))}function S(_,t){try{return _.apply(this,t)}catch(_){K.__wbindgen_exn_store(g(_))}}function x(_,t,e,r){K.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(_,t,g(e),g(r))}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_address_free(_>>>0)));let J=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,D.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_address_free(_)}static from_private_key(t){p(t,o_);const e=K.address_from_private_key(t.__wbg_ptr);return _.__wrap(e)}static from_view_key(t){p(t,V_);const e=K.address_from_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.address_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.address_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}verify(_,t){const e=y(_,K.__wbindgen_malloc),r=U;p(t,h_);return 0!==K.address_verify(this.__wbg_ptr,e,r,t.__wbg_ptr)}};const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_execution_free(_>>>0)));let H=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,L.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_execution_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.execution_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.execution_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_executionresponse_free(_>>>0)));let X=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Q.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Q.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_executionresponse_free(_)}getOutputs(){return a(K.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const _=K.executionresponse_getExecution(this.__wbg_ptr);return 0===_?void 0:H.__wrap(_)}getKeys(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getKeys(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return __.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const _=K.executionresponse_getProvingKey(this.__wbg_ptr);return 0===_?void 0:l_.__wrap(_)}getVerifyingKey(){const _=K.executionresponse_getVerifyingKey(this.__wbg_ptr);return S_.__wrap(_)}getFunctionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.executionresponse_getFunctionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}getProgram(){const _=K.executionresponse_getProgram(this.__wbg_ptr);return g_.__wrap(_)}};const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_field_free(_>>>0)));let G=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,Y.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_field_free(_)}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.field_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.field_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const Z="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_keypair_free(_>>>0)));class __{static __wrap(_){_>>>=0;const t=Object.create(__.prototype);return t.__wbg_ptr=_,Z.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Z.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_keypair_free(_)}constructor(_,t){p(_,l_);var e=_.__destroy_into_raw();p(t,S_);var r=t.__destroy_into_raw();const n=K.keypair_new(e,r);return this.__wbg_ptr=n>>>0,this}provingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_provingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return l_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.keypair_verifyingKey(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return S_.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}}const t_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_metadata_free(_>>>0)));let e_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,t_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,t_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_metadata_free(_)}get name(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_name(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set name(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_name(this.__wbg_ptr,t,e)}get locator(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_locator(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set locator(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_locator(this.__wbg_ptr,t,e)}get prover(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_prover(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set prover(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_prover(this.__wbg_ptr,t,e)}get verifier(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifier(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifier(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifier(this.__wbg_ptr,t,e)}get verifyingKey(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.__wbg_get_metadata_verifyingKey(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}set verifyingKey(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;K.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,t,e)}static baseUrl(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.metadata_baseUrl(n);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static bond_public(){const t=K.metadata_bond_public();return _.__wrap(t)}static bond_validator(){const t=K.metadata_bond_validator();return _.__wrap(t)}static claim_unbond_public(){const t=K.metadata_claim_unbond_public();return _.__wrap(t)}static fee_private(){const t=K.metadata_fee_private();return _.__wrap(t)}static fee_public(){const t=K.metadata_fee_public();return _.__wrap(t)}static inclusion(){const t=K.metadata_inclusion();return _.__wrap(t)}static join(){const t=K.metadata_join();return _.__wrap(t)}static set_validator_state(){const t=K.metadata_set_validator_state();return _.__wrap(t)}static split(){const t=K.metadata_split();return _.__wrap(t)}static transfer_private(){const t=K.metadata_transfer_private();return _.__wrap(t)}static transfer_private_to_public(){const t=K.metadata_transfer_private_to_public();return _.__wrap(t)}static transfer_public(){const t=K.metadata_transfer_public();return _.__wrap(t)}static transfer_public_as_signer(){const t=K.metadata_transfer_public_as_signer();return _.__wrap(t)}static transfer_public_to_private(){const t=K.metadata_transfer_public_to_private();return _.__wrap(t)}static unbond_public(){const t=K.metadata_unbond_public();return _.__wrap(t)}};const r_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_offlinequery_free(_>>>0)));let n_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,r_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,r_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_offlinequery_free(_)}constructor(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.offlinequery_new(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return this.__wbg_ptr=t>>>0,this}finally{K.__wbindgen_add_to_stack_pointer(16)}}addStatePath(_,t){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U,o=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.offlinequery_addStatePath(r,this.__wbg_ptr,n,i,o,s);var e=b()[r/4+0];if(b()[r/4+1])throw a(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.offlinequery_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.offlinequery_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const i_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekey_free(_>>>0)));let o_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,i_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,i_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekey_free(_)}constructor(){const _=K.privatekey_new();return this.__wbg_ptr=_>>>0,this}static from_seed_unchecked(t){const e=y(t,K.__wbindgen_malloc),r=U,n=K.privatekey_from_seed_unchecked(e,r);return _.__wrap(n)}static from_string(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekey_from_string(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_view_key(){const _=K.privatekey_to_view_key(this.__wbg_ptr);return V_.__wrap(_)}to_address(){const _=K.privatekey_to_address(this.__wbg_ptr);return J.__wrap(_)}sign(_){const t=y(_,K.__wbindgen_malloc),e=U,r=K.privatekey_sign(this.__wbg_ptr,t,e);return h_.__wrap(r)}static newEncrypted(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_newEncrypted(r,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekey_toCiphertext(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return s_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,s_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_fromPrivateKeyCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const a_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_privatekeyciphertext_free(_>>>0)));let s_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,a_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,a_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_privatekeyciphertext_free(_)}static encryptPrivateKey(t,e){try{const i=K.__wbindgen_add_to_stack_pointer(-16);p(t,o_);const o=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),s=U;K.privatekey_toCiphertext(i,t.__wbg_ptr,o,s);var r=b()[i/4+0],n=b()[i/4+1];if(b()[i/4+2])throw a(n);return _.__wrap(r)}finally{K.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.privatekeyciphertext_decryptToPrivateKey(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return o_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.privatekeyciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.privatekeyciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}};const c_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_program_free(_>>>0)));let g_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,c_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,c_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_program_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.program_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}hasFunction(_){const t=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;return 0!==K.program_hasFunction(this.__wbg_ptr,t,e)}getFunctions(){return a(K.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getFunctionInputs(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_getMappings(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return a(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getRecordMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.program_getStructMembers(r,this.__wbg_ptr,n,i);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return a(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=K.program_getCreditsProgram();return _.__wrap(t)}id(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.program_id(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}address(){try{const e=K.__wbindgen_add_to_stack_pointer(-16);K.program_address(e,this.__wbg_ptr);var _=b()[e/4+0],t=b()[e/4+1];if(b()[e/4+2])throw a(t);return J.__wrap(_)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){p(t,_);return 0!==K.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return a(K.program_getImports(this.__wbg_ptr))}};const w_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_programmanager_free(_>>>0)));let d_=class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,w_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_programmanager_free(_)}static buildDeploymentTransaction(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U;let u=0;d(r)||(p(r,y_),u=r.__destroy_into_raw());var f=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U;let m=0;d(o)||(p(o,l_),m=o.__destroy_into_raw());let h=0;d(s)||(p(s,S_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,n_),v=c.__destroy_into_raw());return a(K.programmanager_buildDeploymentTransaction(_.__wbg_ptr,b,l,e,u,f,y,d(i)?0:g(i),m,h,v))}static estimateDeploymentFee(_,t){const e=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;return a(K.programmanager_estimateDeploymentFee(e,r,d(t)?0:g(t)))}static estimateProgramNameCost(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16),n=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),i=U;K.programmanager_estimateProgramNameCost(r,n,i);var t=h()[r/8+0],e=b()[r/4+2];if(b()[r/4+3])throw a(e);return BigInt.asUintN(64,t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(_,t,e,r,n,i,o,s,c,b,l){p(_,o_);const u=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U,y=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(s)||(p(s,l_),h=s.__destroy_into_raw());let v=0;d(c)||(p(c,S_),v=c.__destroy_into_raw());var k=d(b)?0:w(b,K.__wbindgen_malloc,K.__wbindgen_realloc),P=U;let S=0;d(l)||(p(l,n_),S=l.__destroy_into_raw());return a(K.programmanager_executeFunctionOffline(_.__wbg_ptr,u,f,y,m,g(r),n,i,d(o)?0:g(o),h,v,k,P,S))}static buildExecutionTransaction(_,t,e,r,n,i,o,s,c,b,l,u,f){p(_,o_);const y=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U,h=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),v=U;let k=0;d(i)||(p(i,y_),k=i.__destroy_into_raw());var P=d(o)?0:w(o,K.__wbindgen_malloc,K.__wbindgen_realloc),S=U;let x=0;d(c)||(p(c,l_),x=c.__destroy_into_raw());let V=0;d(b)||(p(b,S_),V=b.__destroy_into_raw());let F=0;d(l)||(p(l,l_),F=l.__destroy_into_raw());let T=0;d(u)||(p(u,S_),T=u.__destroy_into_raw());let R=0;d(f)||(p(f,n_),R=f.__destroy_into_raw());return a(K.programmanager_buildExecutionTransaction(_.__wbg_ptr,y,m,h,v,g(r),n,k,P,S,d(s)?0:g(s),x,V,F,T,R))}static estimateExecutionFee(_,t,e,r,n,i,o,s,c){p(_,o_);const b=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),l=U,u=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),f=U;var y=d(n)?0:w(n,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,n_),k=c.__destroy_into_raw());return a(K.programmanager_estimateExecutionFee(_.__wbg_ptr,b,l,u,f,g(r),y,m,d(i)?0:g(i),h,v,k))}static estimateFinalizeFee(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.programmanager_estimateFinalizeFee(n,i,o,s,c);var e=h()[n/8+0],r=b()[n/4+2];if(b()[n/4+3])throw a(r);return BigInt.asUintN(64,e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(_,t,e,r,n,i,o,s,c,g,b){p(_,o_),p(t,y_);var l=t.__destroy_into_raw();p(e,y_);var u=e.__destroy_into_raw();let f=0;d(n)||(p(n,y_),f=n.__destroy_into_raw());var y=d(i)?0:w(i,K.__wbindgen_malloc,K.__wbindgen_realloc),m=U;let h=0;d(o)||(p(o,l_),h=o.__destroy_into_raw());let v=0;d(s)||(p(s,S_),v=s.__destroy_into_raw());let k=0;d(c)||(p(c,l_),k=c.__destroy_into_raw());let P=0;d(g)||(p(g,S_),P=g.__destroy_into_raw());let S=0;d(b)||(p(b,n_),S=b.__destroy_into_raw());return a(K.programmanager_buildJoinTransaction(_.__wbg_ptr,l,u,r,f,y,m,h,v,k,P,S))}static buildSplitTransaction(_,t,e,r,n,i,o){p(_,o_),p(e,y_);var s=e.__destroy_into_raw(),c=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),g=U;let b=0;d(n)||(p(n,l_),b=n.__destroy_into_raw());let l=0;d(i)||(p(i,S_),l=i.__destroy_into_raw());let u=0;d(o)||(p(o,n_),u=o.__destroy_into_raw());return a(K.programmanager_buildSplitTransaction(_.__wbg_ptr,t,s,c,g,b,l,u))}static buildTransferTransaction(_,t,e,r,n,i,o,s,c,g,b,l,u){p(_,o_);const f=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U,m=w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),h=U;let v=0;d(n)||(p(n,y_),v=n.__destroy_into_raw());let k=0;d(o)||(p(o,y_),k=o.__destroy_into_raw());var P=d(s)?0:w(s,K.__wbindgen_malloc,K.__wbindgen_realloc),S=U;let x=0;d(c)||(p(c,l_),x=c.__destroy_into_raw());let V=0;d(g)||(p(g,S_),V=g.__destroy_into_raw());let F=0;d(b)||(p(b,l_),F=b.__destroy_into_raw());let T=0;d(l)||(p(l,S_),T=l.__destroy_into_raw());let R=0;d(u)||(p(u,n_),R=u.__destroy_into_raw());return a(K.programmanager_buildTransferTransaction(_.__wbg_ptr,t,f,y,m,h,v,i,k,P,S,x,V,F,T,R))}static synthesizeKeyPair(_,t,e,r,n){p(_,o_);const i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;return a(K.programmanager_synthesizeKeyPair(_.__wbg_ptr,i,o,s,c,g(r),d(n)?0:g(n)))}};const b_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_provingkey_free(_>>>0)));let l_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,b_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,b_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_provingkey_free(_)}isBondPublicProver(){return 0!==K.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==K.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==K.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==K.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==K.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==K.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==K.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==K.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==K.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==K.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==K.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==K.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==K.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==K.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==K.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.provingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.provingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.provingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.provingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const u_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordciphertext_free(_>>>0)));let f_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,u_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,u_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordciphertext_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordciphertext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordciphertext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}decrypt(_){try{const r=K.__wbindgen_add_to_stack_pointer(-16);p(_,V_),K.recordciphertext_decrypt(r,this.__wbg_ptr,_.__wbg_ptr);var t=b()[r/4+0],e=b()[r/4+1];if(b()[r/4+2])throw a(e);return y_.__wrap(t)}finally{K.__wbindgen_add_to_stack_pointer(16)}}isOwner(_){p(_,V_);return 0!==K.recordciphertext_isOwner(this.__wbg_ptr,_.__wbg_ptr)}};const p_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_recordplaintext_free(_>>>0)));let y_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,p_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,p_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_recordplaintext_free(_)}commitment(_,t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U,s=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),c=U;K.recordplaintext_commitment(n,this.__wbg_ptr,i,o,s,c);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return G.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.recordplaintext_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}microcredits(){const _=K.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,_)}nonce(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.recordplaintext_nonce(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}serialNumberString(_,t,e){let r,n;try{const u=K.__wbindgen_add_to_stack_pointer(-16);p(_,o_);const f=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),y=U,m=w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),h=U;K.recordplaintext_serialNumberString(u,this.__wbg_ptr,_.__wbg_ptr,f,y,m,h);var i=b()[u/4+0],o=b()[u/4+1],s=b()[u/4+2],g=b()[u/4+3],d=i,l=o;if(g)throw d=0,l=0,a(s);return r=d,n=l,c(d,l)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(r,n,1)}}};const m_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_signature_free(_>>>0)));let h_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,m_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,m_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_signature_free(_)}static sign(t,e){p(t,o_);const r=y(e,K.__wbindgen_malloc),n=U,i=K.privatekey_sign(t.__wbg_ptr,r,n);return _.__wrap(i)}verify(_,t){p(_,J);const e=y(t,K.__wbindgen_malloc),r=U;return 0!==K.signature_verify(this.__wbg_ptr,_.__wbg_ptr,e,r)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.signature_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.signature_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const v_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_transaction_free(_>>>0)));let k_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,v_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,v_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_transaction_free(_)}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.transaction_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionId(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionId(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}transactionType(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.transaction_transactionType(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const P_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_verifyingkey_free(_>>>0)));let S_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,P_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,P_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_verifyingkey_free(_)}static bondPublicVerifier(){const t=K.verifyingkey_bondPublicVerifier();return _.__wrap(t)}static bondValidatorVerifier(){const t=K.verifyingkey_bondValidatorVerifier();return _.__wrap(t)}static claimUnbondPublicVerifier(){const t=K.verifyingkey_claimUnbondPublicVerifier();return _.__wrap(t)}static feePrivateVerifier(){const t=K.verifyingkey_feePrivateVerifier();return _.__wrap(t)}static feePublicVerifier(){const t=K.verifyingkey_feePublicVerifier();return _.__wrap(t)}static inclusionVerifier(){const t=K.verifyingkey_inclusionVerifier();return _.__wrap(t)}static joinVerifier(){const t=K.verifyingkey_joinVerifier();return _.__wrap(t)}static setValidatorStateVerifier(){const t=K.verifyingkey_setValidatorStateVerifier();return _.__wrap(t)}static splitVerifier(){const t=K.verifyingkey_splitVerifier();return _.__wrap(t)}static transferPrivateVerifier(){const t=K.verifyingkey_transferPrivateVerifier();return _.__wrap(t)}static transferPrivateToPublicVerifier(){const t=K.verifyingkey_transferPrivateToPublicVerifier();return _.__wrap(t)}static transferPublicVerifier(){const t=K.verifyingkey_transferPublicVerifier();return _.__wrap(t)}static transferPublicAsSignerVerifier(){const t=K.verifyingkey_transferPublicAsSignerVerifier();return _.__wrap(t)}static transferPublicToPrivateVerifier(){const t=K.verifyingkey_transferPublicToPrivateVerifier();return _.__wrap(t)}static unbondPublicVerifier(){const t=K.verifyingkey_unbondPublicVerifier();return _.__wrap(t)}isBondPublicVerifier(){return 0!==K.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==K.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==K.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==K.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==K.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==K.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==K.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==K.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==K.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==K.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==K.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==K.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==K.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==K.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==K.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_checksum(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}copy(){const t=K.verifyingkey_copy(this.__wbg_ptr);return _.__wrap(t)}static fromBytes(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=y(t,K.__wbindgen_malloc),o=U;K.verifyingkey_fromBytes(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const n=K.__wbindgen_add_to_stack_pointer(-16),i=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;K.verifyingkey_fromString(n,i,o);var e=b()[n/4+0],r=b()[n/4+1];if(b()[n/4+2])throw a(r);return _.__wrap(e)}finally{K.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toBytes(n,this.__wbg_ptr);var _=b()[n/4+0],t=b()[n/4+1],e=b()[n/4+2];if(b()[n/4+3])throw a(e);var r=v(_,t).slice();return K.__wbindgen_free(_,1*t,1),r}finally{K.__wbindgen_add_to_stack_pointer(16)}}toString(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.verifyingkey_toString(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}};const x_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((_=>K.__wbg_viewkey_free(_>>>0)));let V_=class _{static __wrap(t){t>>>=0;const e=Object.create(_.prototype);return e.__wbg_ptr=t,x_.register(e,e.__wbg_ptr,e),e}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,x_.unregister(this),_}free(){const _=this.__destroy_into_raw();K.__wbg_viewkey_free(_)}static from_private_key(t){p(t,o_);const e=K.privatekey_to_view_key(t.__wbg_ptr);return _.__wrap(e)}static from_string(t){const e=w(t,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U,n=K.viewkey_from_string(e,r);return _.__wrap(n)}to_string(){let _,t;try{const n=K.__wbindgen_add_to_stack_pointer(-16);K.viewkey_to_string(n,this.__wbg_ptr);var e=b()[n/4+0],r=b()[n/4+1];return _=e,t=r,c(e,r)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(_,t,1)}}to_address(){const _=K.address_from_view_key(this.__wbg_ptr);return J.__wrap(_)}decrypt(_){let t,e;try{const d=K.__wbindgen_add_to_stack_pointer(-16),l=w(_,K.__wbindgen_malloc,K.__wbindgen_realloc),u=U;K.viewkey_decrypt(d,this.__wbg_ptr,l,u);var r=b()[d/4+0],n=b()[d/4+1],i=b()[d/4+2],o=b()[d/4+3],s=r,g=n;if(o)throw s=0,g=0,a(i);return t=s,e=g,c(s,g)}finally{K.__wbindgen_add_to_stack_pointer(16),K.__wbindgen_free(t,e,1)}}};async function V(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}function F(){const _={wbg:{}};return _.wbg.__wbindgen_object_drop_ref=function(_){a(_)},_.wbg.__wbg_new_71801a555ad9f2aa=function(){return S((function(){return g(new XMLHttpRequest)}),arguments)},_.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return S((function(_,t,e){i(_).overrideMimeType(c(t,e))}),arguments)},_.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return S((function(_,t,e,r,n,o){i(_).open(c(t,e),c(r,n),0!==o)}),arguments)},_.wbg.__wbg_send_80d29985093c1ec5=function(){return S((function(_){i(_).send()}),arguments)},_.wbg.__wbg_response_7c2e2759084f7279=function(){return S((function(_){return g(i(_).response)}),arguments)},_.wbg.__wbg_status_d485fb5a478426fb=function(){return S((function(_){return i(_).status}),arguments)},_.wbg.__wbg_new_72fb9a18b5ae2624=function(){return g(new Object)},_.wbg.__wbindgen_string_new=function(_,t){return g(c(_,t))},_.wbg.__wbg_set_1f9b04f170055d33=function(){return S((function(_,t,e){return Reflect.set(i(_),i(t),i(e))}),arguments)},_.wbg.__wbg_new_ab6fd82b10560829=function(){return S((function(){return g(new Headers)}),arguments)},_.wbg.__wbindgen_object_clone_ref=function(_){return g(i(_))},_.wbg.__wbg_new_0d76b0581eca6298=function(){return S((function(){return g(new AbortController)}),arguments)},_.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return g(i(_).signal)},_.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return S((function(_,t,e,r,n){i(_).append(c(t,e),c(r,n))}),arguments)},_.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=i(_)instanceof Response}catch(_){t=!1}return t},_.wbg.__wbg_status_61a01141acd3cf74=function(_){return i(_).status},_.wbg.__wbg_url_5f6dc4009ac5f99d=function(_,t){const e=w(i(t).url,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_headers_9620bfada380764a=function(_){return g(i(_).headers)},_.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return g(Symbol.iterator)},_.wbg.__wbg_get_e3c254076557e348=function(){return S((function(_,t){return g(Reflect.get(i(_),i(t)))}),arguments)},_.wbg.__wbindgen_is_function=function(_){return"function"==typeof i(_)},_.wbg.__wbg_call_27c0f87801dedf93=function(){return S((function(_,t){return g(i(_).call(i(t)))}),arguments)},_.wbg.__wbindgen_is_object=function(_){const t=i(_);return"object"==typeof t&&null!==t},_.wbg.__wbg_next_40fc327bfc8770e6=function(_){return g(i(_).next)},_.wbg.__wbg_next_196c84450b364254=function(){return S((function(_){return g(i(_).next())}),arguments)},_.wbg.__wbg_done_298b57d23c0fc80c=function(_){return i(_).done},_.wbg.__wbg_value_d93c65011f51a456=function(_){return g(i(_).value)},_.wbg.__wbg_abort_2aa7521d5690750e=function(_){i(_).abort()},_.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return S((function(_){return g(JSON.stringify(i(_)))}),arguments)},_.wbg.__wbindgen_string_get=function(_,t){const e=i(t),r="string"==typeof e?e:void 0;var n=d(r)?0:w(r,K.__wbindgen_malloc,K.__wbindgen_realloc),o=U;b()[_/4+1]=o,b()[_/4+0]=n},_.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(c(_,t))},_.wbg.__wbindgen_bigint_from_u64=function(_){return g(BigInt.asUintN(64,_))},_.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return S((function(_,t,e){return g(i(_).call(i(t),i(e)))}),arguments)},_.wbg.__wbg_transaction_new=function(_){return g(k_.__wrap(_))},_.wbg.__wbg_keypair_new=function(_){return g(__.__wrap(_))},_.wbg.__wbindgen_module=function(){return g(A.__wbindgen_wasm_module)},_.wbg.__wbindgen_memory=function(){return g(K.memory)},_.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,e,r){return g(n(i(_),i(t),i(e),r>>>0))},_.wbg.__wbg_executionresponse_new=function(_){return g(X.__wrap(_))},_.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return g(new Array(_>>>0))},_.wbg.__wbg_set_d4638f722068f043=function(_,t,e){i(_)[t>>>0]=a(e)},_.wbg.__wbindgen_cb_drop=function(_){const t=a(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},_.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return g(new Array)},_.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return i(_).push(i(t))},_.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return S((function(_){return g(i(_).arrayBuffer())}),arguments)},_.wbg.__wbg_new_63b92bc8671ed464=function(_){return g(new Uint8Array(i(_)))},_.wbg.__wbg_length_c20a40f15020d68a=function(_){return i(_).length},_.wbg.__wbg_new_81740750da40724f=function(_,t){try{var e={a:_,b:t};const r=new Promise(((_,t)=>{const r=e.a;e.a=0;try{return x(r,e.b,_,t)}finally{e.a=r}}));return g(r)}finally{e.a=e.b=0}},_.wbg.__wbindgen_number_new=function(_){return g(_)},_.wbg.__wbg_new_abda76e883ba8a5f=function(){return g(new Error)},_.wbg.__wbg_stack_658279fe44541cf6=function(_,t){const e=w(i(t).stack,K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbg_error_f851667af71bcfc6=function(_,t){let e,r;try{e=_,r=t,console.error(c(_,t))}finally{K.__wbindgen_free(e,r,1)}},_.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return g(i(_).buffer)},_.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,e){return g(new Uint8Array(i(_),t>>>0,e>>>0))},_.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return S((function(_,t){i(_).randomFillSync(a(t))}),arguments)},_.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,e){return g(i(_).subarray(t>>>0,e>>>0))},_.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return S((function(_,t){i(_).getRandomValues(i(t))}),arguments)},_.wbg.__wbg_set_a47bac70306a19a7=function(_,t,e){i(_).set(i(t),e>>>0)},_.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return g(i(_).crypto)},_.wbg.__wbg_process_4a72847cc503995b=function(_){return g(i(_).process)},_.wbg.__wbg_versions_f686565e586dd935=function(_){return g(i(_).versions)},_.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return g(i(_).node)},_.wbg.__wbindgen_is_string=function(_){return"string"==typeof i(_)},_.wbg.__wbg_require_cca90b1a94a0255b=function(){return S((function(){return g(module.require)}),arguments)},_.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return g(i(_).msCrypto)},_.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return g(new Uint8Array(_>>>0))},_.wbg.__wbg_length_cd7af8117672b8b8=function(_){return i(_).length},_.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return g(i(_)[t>>>0])},_.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return S((function(){return g(self.self)}),arguments)},_.wbg.__wbg_window_c6fb939a7f436783=function(){return S((function(){return g(window.window)}),arguments)},_.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return S((function(){return g(globalThis.globalThis)}),arguments)},_.wbg.__wbg_global_207b558942527489=function(){return S((function(){return g(global.global)}),arguments)},_.wbg.__wbindgen_is_undefined=function(_){return void 0===i(_)},_.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return g(new Function(c(_,t)))},_.wbg.__wbg_has_0af94d20077affa2=function(){return S((function(_,t){return Reflect.has(i(_),i(t))}),arguments)},_.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return g(fetch(i(_)))},_.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return g(i(_).fetch(i(t)))},_.wbg.__wbindgen_debug_string=function(_,t){const e=w(l(i(t)),K.__wbindgen_malloc,K.__wbindgen_realloc),r=U;b()[_/4+1]=r,b()[_/4+0]=e},_.wbg.__wbindgen_throw=function(_,t){throw new Error(c(_,t))},_.wbg.__wbindgen_rethrow=function(_){throw a(_)},_.wbg.__wbg_then_a73caa9a87991566=function(_,t,e){return g(i(_).then(i(t),i(e)))},_.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return g(i(_).then(i(t)))},_.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(i(_))},_.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return g(i(_).queueMicrotask)},_.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return g(Promise.resolve(i(_)))},_.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return g(Atomics.waitAsync)},_.wbg.__wbg_new_8cccba86b0f574cb=function(_){return g(new Int32Array(i(_)))},_.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,e){return g(Atomics.waitAsync(i(_),t,e))},_.wbg.__wbg_async_19c0400d97cc72fe=function(_){return i(_).async},_.wbg.__wbg_value_571d60108110e917=function(_){return g(i(_).value)},_.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(_){const t=w("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),K.__wbindgen_malloc,K.__wbindgen_realloc),e=U;b()[_/4+1]=e,b()[_/4+0]=t},_.wbg.__wbg_new_d1187ae36d662ef9=function(){return S((function(_,t){return g(new Worker(c(_,t)))}),arguments)},_.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){i(_).onmessage=i(t)},_.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,e){return g(Array.of(i(_),i(t),i(e)))},_.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return S((function(_,t){i(_).postMessage(i(t))}),arguments)},_.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return g(i(_).data)},_.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return S((function(_,t,e){return g(new Request(c(_,t),i(e)))}),arguments)},_.wbg.__wbg_responseText_c67ed2d48db10769=function(){return S((function(_,t){const e=i(t).responseText;var r=d(e)?0:w(e,K.__wbindgen_malloc,K.__wbindgen_realloc),n=U;b()[_/4+1]=n,b()[_/4+0]=r}),arguments)},_.wbg.__wbindgen_closure_wrapper5837=function(_,t,e){return g(u(_,t,538,f))},_.wbg.__wbindgen_closure_wrapper5862=function(_,t,e){return g(u(_,t,538,f))},_}function T(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function R(_,t){return K=_.exports,A.__wbindgen_wasm_module=t,N=null,W=null,B=null,K.__wbindgen_start(),K}function z(_,t){if(void 0!==K)return K;const e=F();T(e,t),_ instanceof WebAssembly.Module||(_=new WebAssembly.Module(_));return R(new WebAssembly.Instance(_,e),_)}async function A(_,t){if(void 0!==K)return K;const e=F();("string"==typeof _||"function"==typeof Request&&_ instanceof Request||"function"==typeof URL&&_ instanceof URL)&&(_=fetch(_)),T(e,t);const{instance:r,module:n}=await V(await _,e);return R(r,n)}var O=Object.freeze({__proto__:null,Address:J,Execution:H,ExecutionResponse:X,Field:G,KeyPair:__,Metadata:e_,OfflineQuery:n_,PrivateKey:o_,PrivateKeyCiphertext:s_,Program:g_,ProgramManager:d_,ProvingKey:l_,RecordCiphertext:f_,RecordPlaintext:y_,Signature:h_,Transaction:k_,VerifyingKey:S_,ViewKey:V_,default:A,initSync:z,initThreadPool:P,runRayonThread:k,verifyFunctionExecution:m});const F_="assets/aleo_wasm.wasm";const{initThreadPool:T_,Address:R_,Execution:z_,ExecutionResponse:A_,Field:O_,Metadata:j_,OfflineQuery:K_,Private:C_,PrivateKey:E_,PrivateKeyCiphertext:M_,Program:B_,ProvingKey:U_,RecordCiphertext:I_,RecordPlaintext:q_,ProgramManager:W_,Signature:$_,Transaction:N_,ViewKey:D_,VerifyingKey:J_,verifyFunctionExecution:L_}=await(async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n=F_;return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(A,n):await A(n),O})({importHook:()=>new URL(e(5934),e.b)});async function j(_){null==_&&(_=navigator.hardwareConcurrency),console.info(`Spawning ${_} threads`),await T_(new URL(e(2583),e.b),_)}r()}catch(H_){r(H_)}}),1)}}]); //# sourceMappingURL=933.bundle.js.map \ No newline at end of file diff --git a/933.bundle.js.map b/933.bundle.js.map index e6b1cd3a5..8a1d6d794 100644 --- a/933.bundle.js.map +++ b/933.bundle.js.map @@ -1 +1 @@ -{"version":3,"file":"933.bundle.js","mappings":"wOAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,E,qHAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR9D,EACA,MAAQ,IAAG8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EACjC,YAAW+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACP,GAAEoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAO,wBAAuB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,K,MAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,K,MAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,K,MAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,GAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,K,MAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,GAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,GAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,GAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,K,OAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,GAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,GAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,QAAIgC,GACA,IAAI8F,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0M,wBAAwBtG,EAAQwB,KAAKd,WAC1C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAI/F,CAAKyB,GACL,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK2M,wBAAwB/E,KAAKd,UAAWL,EAAMG,EAC3D,CAII,WAAIgG,GACA,IAAItD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6M,2BAA2BzG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIqD,CAAQ3H,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK8M,2BAA2BlF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAImG,GACA,IAAIzD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgN,0BAA0B5G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIwD,CAAO9H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKiN,0BAA0BrF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIsG,GACA,IAAI5D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,4BAA4B/G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAI2D,CAASjI,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,4BAA4BxF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqN,gCAAgCjH,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKsN,gCAAgC1F,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAO2G,GACH,IAAIjE,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwN,iBAAiBpH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOkE,GACH,MAAM7M,EAAMZ,EAAK0N,uBACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,qBAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,0BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,0BAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,+BACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,uBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,sBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,qBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,WAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,gBACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,0BAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,+BACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,YAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,iBACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,uBAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,4BACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,sCACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,2BACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,qCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,sCACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,CAII,oBAAOyO,GACH,MAAMzO,EAAMZ,EAAKsP,yBACjB,OAAO7C,EAASpE,OAAOzH,EAC/B,GAGA,MAAM2O,GAA4D,oBAAzBhL,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwP,wBAAwBhO,IAAQ,K,OAK3E,MAAMiO,EAEF,aAAOpH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkH,EAAajH,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB+N,GAAyB/K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByI,GAAyB9K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwP,wBAAwBhO,EACrC,CAKIuK,WAAAA,CAAY2D,GACR,IACI,MAAMtJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkN,EAAY1P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAK2P,iBAAiBvJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIuJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAM1J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBqN,EAAY7P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBsN,EAAY9P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEoJ,EAAOlO,EACb7B,EAAKgQ,0BAA0B5J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzE,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiQ,sBAAsB7J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWgG,GACd,IACI,MAAM9J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0N,EAAGlQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKmQ,wBAAwB/J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyI,EAAapH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+J,GAA0D,oBAAzB7L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqQ,sBAAsB7O,IAAQ,K,OAIzE,MAAM8O,EAEF,aAAOjI,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+H,EAAW9H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB4O,GAAuB5L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsJ,GAAuB3L,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqQ,sBAAsB7O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKuQ,iBAEjB,OADA3I,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO4I,CAAoBC,GACvB,MAAMhK,EAAOX,EAAkB2K,EAAMzQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAK0Q,+BAA+BjK,EAAMG,GACtD,OAAO0J,EAAWjI,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK2Q,uBAAuBvK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4Q,qBAAqBxK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,WAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,uBAAuBlJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOImQ,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKgR,sBAAsBpJ,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASIsQ,IAAAA,CAAK9M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOwQ,CAAaC,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKsR,wBAAwBlL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUImL,YAAAA,CAAaH,GACT,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOqL,CAAyBC,EAAYN,GACxC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAagM,EAAYJ,IACzB,MAAM9K,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4R,oCAAoCxL,EAAQuL,EAAW7K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwL,GAAoE,oBAAzBtN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8R,gCAAgCtQ,IAAQ,K,OAInF,MAAMuQ,EAEF,aAAO1J,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOwJ,EAAqBvJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBqQ,GAAiCrN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+K,GAAiCpN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8R,gCAAgCtQ,EAC7C,CAYI,wBAAOwQ,CAAkBpJ,EAAayI,GAClC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI4L,mBAAAA,CAAoBZ,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKkS,yCAAyC9L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,GAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmS,8BAA8B/L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWyH,GACd,IACI,MAAMvL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKoS,gCAAgChM,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMgM,GAAuD,oBAAzB9N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsS,mBAAmB9Q,IAAQ,K,OAItE,MAAM+Q,EAEF,aAAOlK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgK,EAAQ/J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB6Q,GAAoB7N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuL,GAAoB5N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsS,mBAAmB9Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKwS,mBAAmBpM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuL,EAAQlK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyS,iBAAiBrM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASImJ,WAAAA,CAAYC,GACR,MAAMlM,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK4S,oBAAoBhL,KAAKd,UAAWL,EAAMG,EAEnE,CAuBIiM,YAAAA,GAEI,OAAOlS,EADKX,EAAK8S,qBAAqBlL,KAAKd,WAEnD,CAyCIiM,iBAAAA,CAAkBJ,GACd,IACI,MAAMvM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAKgT,0BAA0B5M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI4M,WAAAA,GACI,IACI,MAAM7M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKkT,oBAAoB9M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI8M,gBAAAA,CAAiBC,GACb,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqT,yBAAyBjN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDIiN,gBAAAA,CAAiBC,GACb,IACI,MAAMnN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB+Q,EAAavT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKwT,yBAAyBpN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOoN,GACH,MAAM7S,EAAMZ,EAAK0T,4BACjB,OAAOnB,EAAQlK,OAAOzH,EAC9B,CAOI+S,EAAAA,GACI,IAAIrK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4T,WAAWxN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6T,gBAAgBzN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOiK,EAAQ5I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyN,OAAAA,CAAQC,GACJpO,EAAaoO,EAAOxB,GAEpB,OAAe,IADHvS,EAAKgU,gBAAgBpM,KAAKd,UAAWiN,EAAMjN,UAE/D,CA0BImN,UAAAA,GAEI,OAAOtT,EADKX,EAAKkU,mBAAmBtM,KAAKd,WAEjD,GAGA,MAAMqN,GAA8D,oBAAzB5P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoU,0BAA0B5S,IAAQ,K,OAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqN,GAA2B1P,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoU,0BAA0B5S,EACvC,CA8BI,iCAAO6S,CAA2BzL,EAAa1C,EAASoO,EAAaC,EAAYvV,EAAKwV,EAASC,EAAiBC,EAAmBC,GAC/HhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzB3I,EAAOsI,EAAW9L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9B+J,EAAON,EAAgBhM,sBAE3B,IAAIuM,EAAO,EACNhS,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChCyO,EAAON,EAAkBjM,sBAE7B,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKmV,0CAA0CvM,EAAY9B,UAAWL,EAAMG,EAAM0N,EAAarI,EAAM4I,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBlP,EAASsO,GAClC,MAAM/N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKqV,qCAAqC5O,EAAMG,EAAM5D,EAAWwR,GAAW,EAAI7S,EAAc6S,IAElH,CAaI,8BAAOc,CAAwB9R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKuV,uCAAuCnP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOsP,CAAuB/M,EAAa1C,EAAS0P,EAAWC,EAAQC,EAAiBC,EAAOvB,EAASxI,EAAa/F,EAAejH,EAAK2V,GACrIhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiW,sCAAsCrN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASC,EAAiBC,EAAO/S,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BtN,EAAa1C,EAAS0P,EAAWC,EAAQvB,EAAaC,EAAYvV,EAAKwV,EAASxI,EAAa/F,EAAewO,EAAiBC,EAAmBC,GAC7KhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1BgK,EAAOhJ,EAAYvD,sBAEvB,IAAIwM,EAAO,EACNjS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5B0O,EAAOhP,EAAcwC,sBAEzB,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuW,yCAAyC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMnT,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB5N,EAAa1C,EAAS0P,EAAWC,EAAQ7W,EAAKwV,EAASxI,EAAa/F,EAAe0O,GAC3GhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B+J,EAAO/I,EAAYvD,sBAEvB,IAAIuM,EAAO,EACNhS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5ByO,EAAO/O,EAAcwC,sBAEzB,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKyW,oCAAoC7N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAShB,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBxQ,EAAS0P,GAChC,IACI,MAAMxP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb7B,EAAK2W,mCAAmCvQ,EAAQK,EAAMG,EAAMqF,EAAM8D,GAClE,IAAIhJ,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOuQ,CAAqBhO,EAAaiO,EAAUC,EAAUxC,EAAaC,EAAYvV,EAAK+X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjKhP,EAAaiD,EAAaC,IAC1BlD,EAAakR,EAAUjC,IACvB,IAAInO,EAAOoQ,EAASpO,qBACpB9C,EAAamR,EAAUlC,IACvB,IAAI3I,EAAO6K,EAASrO,qBACpB,IAAIoM,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAW+T,KACZpR,EAAaoR,EAAkB/L,IAC/BgK,EAAO+B,EAAiBtO,sBAE5B,IAAIwM,EAAO,EACNjS,EAAWgU,KACZrR,EAAaqR,EAAoBzQ,IACjC0O,EAAO+B,EAAmBvO,sBAE9B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiX,oCAAoCrO,EAAY9B,UAAWL,EAAMwF,EAAMqI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBtO,EAAauO,EAAcC,EAAepY,EAAKqY,EAAmBC,EAAqB3C,GAChHhP,EAAaiD,EAAaC,IAC1BlD,EAAayR,EAAexC,IAC5B,IAAInO,EAAO2Q,EAAc3O,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACX,IAAIgT,EAAO,EACN7R,EAAWqU,KACZ1R,EAAa0R,EAAmBrM,IAChC6J,EAAOwC,EAAkB5O,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWsU,KACZ3R,EAAa2R,EAAqB/Q,IAClCwO,EAAOuC,EAAoB7O,sBAE/B,IAAIuM,EAAO,EACNhS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BF,EAAOL,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuX,qCAAqC3O,EAAY9B,UAAWqQ,EAAc1Q,EAAMwF,EAAM8D,EAAM8E,EAAME,EAAMC,GAEjI,CAgCI,+BAAOwC,CAAyB5O,EAAa6O,EAAgBC,EAAWC,EAAeP,EAAe9C,EAAaC,EAAYvV,EAAK4Y,EAAsBC,EAAwBpD,EAAiBC,EAAmBC,GAClNhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBkV,EAAW1X,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBmV,EAAe3X,EAAK0G,kBAAmB1G,EAAK2G,oBACrEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAexC,IAC5BC,EAAOuC,EAAc3O,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBG,EAAOR,EAAW9L,sBAEtB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW4U,KACZjS,EAAaiS,EAAsB5M,IACnCiK,EAAO2C,EAAqBnP,sBAEhC,IAAI2N,EAAO,EACNpT,EAAW6U,KACZlS,EAAakS,EAAwBtR,IACrC6P,EAAOyB,EAAuBpP,sBAElC,IAAI4N,EAAO,EACNrT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BqL,EAAO5B,EAAgBhM,sBAE3B,IAAI6N,EAAO,EACNtT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC+P,EAAO5B,EAAkBjM,sBAE7B,IAAIqP,EAAO,EACN9U,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5B4C,EAAOnD,EAAclM,sBAGzB,OAAO9H,EADKX,EAAK+X,wCAAwCnP,EAAY9B,UAAW2Q,EAAgBhR,EAAMG,EAAMqF,EAAM8D,EAAM8E,EAAMP,EAAaS,EAAMC,EAAMgB,EAAMf,EAAMmB,EAAMC,EAAMC,EAAMwB,GAE7L,CAeI,wBAAOE,CAAkBpP,EAAa1C,EAASC,EAAa0P,EAAQrB,GAChE7O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EAEb,OAAOlB,EADKX,EAAKiY,iCAAiCrP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAS7S,EAAWwR,GAAW,EAAI7S,EAAc6S,IAExK,GAGA,MAAM0D,GAA0D,oBAAzB3T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmY,sBAAsB3W,IAAQ,K,OAIzE,MAAM4W,EAEF,aAAO/P,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6P,EAAW5P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0W,GAAuB1T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoR,GAAuBzT,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmY,sBAAsB3W,EACnC,CAWI6W,kBAAAA,GAEI,OAAe,IADHrY,EAAKsY,8BAA8B1Q,KAAKd,UAE5D,CAWIyR,qBAAAA,GAEI,OAAe,IADHvY,EAAKwY,iCAAiC5Q,KAAKd,UAE/D,CAWI2R,yBAAAA,GAEI,OAAe,IADHzY,EAAK0Y,qCAAqC9Q,KAAKd,UAEnE,CAWI6R,kBAAAA,GAEI,OAAe,IADH3Y,EAAK4Y,8BAA8BhR,KAAKd,UAE5D,CAWI+R,iBAAAA,GAEI,OAAe,IADH7Y,EAAK8Y,6BAA6BlR,KAAKd,UAE3D,CAWIiS,iBAAAA,GAEI,OAAe,IADH/Y,EAAKgZ,6BAA6BpR,KAAKd,UAE3D,CAWImS,YAAAA,GAEI,OAAe,IADHjZ,EAAKkZ,wBAAwBtR,KAAKd,UAEtD,CAWIqS,yBAAAA,GAEI,OAAe,IADHnZ,EAAKoZ,qCAAqCxR,KAAKd,UAEnE,CAWIuS,aAAAA,GAEI,OAAe,IADHrZ,EAAKsZ,yBAAyB1R,KAAKd,UAEvD,CAWIyS,uBAAAA,GAEI,OAAe,IADHvZ,EAAKwZ,mCAAmC5R,KAAKd,UAEjE,CAWI2S,+BAAAA,GAEI,OAAe,IADHzZ,EAAK0Z,2CAA2C9R,KAAKd,UAEzE,CAWI6S,sBAAAA,GAEI,OAAe,IADH3Z,EAAK4Z,kCAAkChS,KAAKd,UAEhE,CAWI+S,8BAAAA,GAEI,OAAe,IADH7Z,EAAK8Z,0CAA0ClS,KAAKd,UAExE,CAWIiT,+BAAAA,GAEI,OAAe,IADH/Z,EAAKga,2CAA2CpS,KAAKd,UAEzE,CAWImT,oBAAAA,GAEI,OAAe,IADHja,EAAKka,gCAAgCtS,KAAKd,UAE9D,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoa,oBAAoBhU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAKsa,gBAAgB1S,KAAKd,WACtC,OAAOsR,EAAW/P,OAAOzH,EACjC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAKya,qBAAqBrU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK2a,sBAAsBvU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6a,mBAAmBzU,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+a,oBAAoB3U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyR,GAAgE,oBAAzBzW,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKib,4BAA4BzZ,IAAQ,K,OAI/E,MAAM0Z,EAEF,aAAO7S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2S,EAAiB1S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChBwZ,GAA6BxW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkU,GAA6BvW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKib,4BAA4BzZ,EACzC,CASI,iBAAO0I,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKob,4BAA4BhV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkU,EAAiB7S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqb,0BAA0BjV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI+R,OAAAA,CAAQtS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKub,yBAAyBnV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4N,GAAgBvM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASImV,OAAAA,CAAQxS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAKyb,yBAAyB7T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM4U,GAA+D,oBAAzBnX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2b,2BAA2Bna,IAAQ,K,OAI9E,MAAMoa,EAEF,aAAOvT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqT,EAAgBpT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBka,GAA4BlX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4U,GAA4BjX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2b,2BAA2Bna,EACxC,CAMIqO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAK6b,2BAA2BzV,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GAC1E,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO8U,EAAMzT,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK+b,2BAA2B3V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4U,EAAgBvT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgc,yBAAyB5V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI0S,YAAAA,GACI,MAAMrb,EAAMZ,EAAKkc,6BAA6BtU,KAAKd,WACnD,OAAO2O,OAAOC,QAAQ,GAAI9U,EAClC,CAOIub,KAAAA,GACI,IAAI7S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoc,sBAAsBhW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI8S,kBAAAA,CAAmBzT,EAAagL,EAAYR,GACxC,IAAIkJ,EACAC,EACJ,IACI,MAAMnW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAKwc,mCAAmCpW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzG,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpC2O,EAAOhO,EACPoP,EAAOnP,EACX,GAAIyV,EAEA,MADA1H,EAAO,EAAGoB,EAAO,EACXxV,EAAW6U,GAIrB,OAFA8G,EAAcvH,EACdwH,EAAcpG,EACP5U,EAAmBwT,EAAMoB,EAC5C,CAAU,QACEnW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB6S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBnY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2c,qBAAqBnb,IAAQ,K,OAIxE,MAAMob,EAEF,aAAOvU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqU,EAAUpU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBkb,GAAsBlY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4V,GAAsBjY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2c,qBAAqBnb,EAClC,CAWI,WAAO0P,CAAKtI,EAAaxE,GACrBuB,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOgW,EAAUvU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS8R,GACtB,MAAMxK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK6c,iBAAiBjV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK8c,sBAAsBrW,EAAMG,GAC7C,OAAOgW,EAAUvU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+c,oBAAoB3W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyT,GAA2D,oBAAzBzY,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKid,uBAAuBzb,IAAQ,K,OAO1E,MAAM0b,EAEF,aAAO7U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2U,EAAY1U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChBwb,GAAwBxY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkW,GAAwBvY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKid,uBAAuBzb,EACpC,CASI,iBAAO0I,CAAWiT,GACd,IACI,MAAM/W,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2a,EAAand,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKod,uBAAuBhX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkW,EAAY7U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqd,qBAAqBjX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI+T,aAAAA,GACI,IAAIhU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKud,0BAA0BnX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIiU,eAAAA,GACI,IAAIlU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyd,4BAA4BrX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMmU,GAA4D,oBAAzBnZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2d,wBAAwBnc,IAAQ,K,OAI3E,MAAMoc,EAEF,aAAOvV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqV,EAAapV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBkc,GAAyBlZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4W,GAAyBjZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2d,wBAAwBnc,EACrC,CAOI,yBAAOqc,GACH,MAAMjd,EAAMZ,EAAK8d,kCACjB,OAAOF,EAAavV,OAAOzH,EACnC,CAOI,4BAAOmd,GACH,MAAMnd,EAAMZ,EAAKge,qCACjB,OAAOJ,EAAavV,OAAOzH,EACnC,CAOI,gCAAOqd,GACH,MAAMrd,EAAMZ,EAAKke,yCACjB,OAAON,EAAavV,OAAOzH,EACnC,CAOI,yBAAOud,GACH,MAAMvd,EAAMZ,EAAKoe,kCACjB,OAAOR,EAAavV,OAAOzH,EACnC,CAOI,wBAAOyd,GACH,MAAMzd,EAAMZ,EAAKse,iCACjB,OAAOV,EAAavV,OAAOzH,EACnC,CAOI,wBAAO2d,GACH,MAAM3d,EAAMZ,EAAKwe,iCACjB,OAAOZ,EAAavV,OAAOzH,EACnC,CAOI,mBAAO6d,GACH,MAAM7d,EAAMZ,EAAK0e,4BACjB,OAAOd,EAAavV,OAAOzH,EACnC,CAOI,gCAAO+d,GACH,MAAM/d,EAAMZ,EAAK4e,yCACjB,OAAOhB,EAAavV,OAAOzH,EACnC,CAOI,oBAAOie,GACH,MAAMje,EAAMZ,EAAK8e,6BACjB,OAAOlB,EAAavV,OAAOzH,EACnC,CAOI,8BAAOme,GACH,MAAMne,EAAMZ,EAAKgf,uCACjB,OAAOpB,EAAavV,OAAOzH,EACnC,CAOI,sCAAOqe,GACH,MAAMre,EAAMZ,EAAKkf,+CACjB,OAAOtB,EAAavV,OAAOzH,EACnC,CAOI,6BAAOue,GACH,MAAMve,EAAMZ,EAAKof,sCACjB,OAAOxB,EAAavV,OAAOzH,EACnC,CAOI,qCAAOye,GACH,MAAMze,EAAMZ,EAAKsf,8CACjB,OAAO1B,EAAavV,OAAOzH,EACnC,CAOI,sCAAO2e,GACH,MAAM3e,EAAMZ,EAAKwf,+CACjB,OAAO5B,EAAavV,OAAOzH,EACnC,CAOI,2BAAO6e,GACH,MAAM7e,EAAMZ,EAAK0f,oCACjB,OAAO9B,EAAavV,OAAOzH,EACnC,CAOI+e,oBAAAA,GAEI,OAAe,IADH3f,EAAK4f,kCAAkChY,KAAKd,UAEhE,CAOI+Y,uBAAAA,GAEI,OAAe,IADH7f,EAAK8f,qCAAqClY,KAAKd,UAEnE,CAOIiZ,2BAAAA,GAEI,OAAe,IADH/f,EAAKggB,yCAAyCpY,KAAKd,UAEvE,CAOImZ,oBAAAA,GAEI,OAAe,IADHjgB,EAAKkgB,kCAAkCtY,KAAKd,UAEhE,CAOIqZ,mBAAAA,GAEI,OAAe,IADHngB,EAAKogB,iCAAiCxY,KAAKd,UAE/D,CAOIuZ,mBAAAA,GAEI,OAAe,IADHrgB,EAAKsgB,iCAAiC1Y,KAAKd,UAE/D,CAOIyZ,cAAAA,GAEI,OAAe,IADHvgB,EAAKwgB,4BAA4B5Y,KAAKd,UAE1D,CAOI2Z,2BAAAA,GAEI,OAAe,IADHzgB,EAAK0gB,yCAAyC9Y,KAAKd,UAEvE,CAOI6Z,eAAAA,GAEI,OAAe,IADH3gB,EAAK4gB,6BAA6BhZ,KAAKd,UAE3D,CAOI+Z,yBAAAA,GAEI,OAAe,IADH7gB,EAAK8gB,uCAAuClZ,KAAKd,UAErE,CAOIia,iCAAAA,GAEI,OAAe,IADH/gB,EAAKghB,+CAA+CpZ,KAAKd,UAE7E,CAOIma,wBAAAA,GAEI,OAAe,IADHjhB,EAAKkhB,sCAAsCtZ,KAAKd,UAEpE,CAOIqa,gCAAAA,GAEI,OAAe,IADHnhB,EAAKohB,8CAA8CxZ,KAAKd,UAE5E,CAOIua,iCAAAA,GAEI,OAAe,IADHrhB,EAAKshB,+CAA+C1Z,KAAKd,UAE7E,CAOIya,sBAAAA,GAEI,OAAe,IADHvhB,EAAKwhB,oCAAoC5Z,KAAKd,UAElE,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyhB,sBAAsBrb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAK0hB,kBAAkB9Z,KAAKd,WACxC,OAAO8W,EAAavV,OAAOzH,EACnC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK2hB,uBAAuBvb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4hB,wBAAwBxb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6hB,qBAAqBzb,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,sBAAsB1b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMwY,GAAuD,oBAAzBxd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKgiB,mBAAmBxgB,IAAQ,K,OAGtE,MAAMygB,EAEF,aAAO5Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO0Z,EAAQzZ,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBugB,GAAoBvd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBib,GAAoBtd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKgiB,mBAAmBxgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8Q,uBAAuBlI,EAAY9B,WACpD,OAAOmb,EAAQ5Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKkiB,oBAAoBzb,EAAMG,GAC3C,OAAOqb,EAAQ5Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmiB,kBAAkB/b,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIwH,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASI0a,OAAAA,CAAQ3J,GACJ,IAAIyQ,EACAC,EACJ,IACI,MAAMjc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKsiB,gBAAgBlc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACP+N,EAAO9N,EACX,GAAIyV,EAEA,MADA5H,EAAO,EAAGC,EAAO,EACXnU,EAAW6U,GAIrB,OAFA4M,EAAcvN,EACdwN,EAAcvN,EACPvT,EAAmBsT,EAAMC,EAC5C,CAAU,QACE9U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB2Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,EAAWvjB,EAAQuV,GAC9B,GAAwB,mBAAbiO,UAA2BxjB,aAAkBwjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB1jB,EAAQuV,EAEtE,CAAc,MAAO3M,GACL,GAA0C,oBAAtC5I,EAAO2jB,QAAQhe,IAAI,gBAInB,MAAMiD,EAHNgb,QAAQC,KAAK,oMAAqMjb,EAKtO,CAGQ,MAAM2S,QAAcvb,EAAO8jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOhG,EAEpD,CAAW,CACH,MAAM5O,QAAiB8c,YAAYM,YAAY/jB,EAAQuV,GAEvD,OAAI5O,aAAoB8c,YAAYO,SACzB,CAAErd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASsd,IACL,MAAM1O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ2O,IAAIC,2BAA6B,SAASne,GAC9CtE,EAAWsE,EACnB,EACIuP,EAAQ2O,IAAIE,2BAA6B,WAAa,OAAO3b,GAAY,WAErE,OAAO/F,EADK,IAAI2hB,eAExB,GAAOC,UAAU,EACb/O,EAAQ2O,IAAIK,wCAA0C,WAAa,OAAO9b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMwe,iBAAiBliB,EAAmB2D,EAAMO,GAClE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIO,4BAA8B,WAAa,OAAOhc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,EAAMC,GAC9GvjB,EAAU4E,GAAM4e,KAAKtiB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACb/O,EAAQ2O,IAAIW,4BAA8B,WAAa,OAAOpc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM8e,MACxB,GAAOR,UAAU,EACb/O,EAAQ2O,IAAIa,gCAAkC,WAAa,OAAOtc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMgf,SAEpC,GAAOV,UAAU,EACb/O,EAAQ2O,IAAIe,8BAAgC,WAAa,OAAOxc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMkf,MAEpC,GAAOZ,UAAU,EACb/O,EAAQ2O,IAAIiB,2BAA6B,WAErC,OAAOziB,EADK,IAAI2G,OAExB,EACIkM,EAAQ2O,IAAIkB,sBAAwB,SAASpf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIsP,EAAQ2O,IAAImB,2BAA6B,WAAa,OAAO5c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY8e,QAAQliB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIqB,2BAA6B,WAAa,OAAO9c,GAAY,WAErE,OAAO/F,EADK,IAAI8iB,QAExB,GAAOlB,UAAU,EACb/O,EAAQ2O,IAAIuB,4BAA8B,SAASzf,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIuP,EAAQ2O,IAAIwB,2BAA6B,WAAa,OAAOjd,GAAY,WAErE,OAAO/F,EADK,IAAIijB,gBAExB,GAAOrB,UAAU,EACb/O,EAAQ2O,IAAI0B,8BAAgC,SAAS5f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM6f,OAEpC,EACItQ,EAAQ2O,IAAI4B,8BAAgC,WAAa,OAAOrd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,GAC1GtjB,EAAU4E,GAAM+f,OAAOzjB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GACxF,GAAOJ,UAAU,EACb/O,EAAQ2O,IAAI8B,2CAA6C,SAAShgB,GAC9D,IAAIigB,EACJ,IACIA,EAAS7kB,EAAU4E,aAAiBwd,QAChD,CAAU,MAAOte,GACL+gB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI1Q,EAAQ2O,IAAIgC,8BAAgC,SAASlgB,GAEjD,OADY5E,EAAU4E,GAAMkf,MAEpC,EACI3P,EAAQ2O,IAAIiC,2BAA6B,SAASngB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIkC,+BAAiC,SAASpgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM2d,QAEpC,EACIpO,EAAQ2O,IAAImC,gCAAkC,WAE1C,OAAO3jB,EADK4jB,OAAOC,SAE3B,EACIhR,EAAQ2O,IAAIsC,2BAA6B,WAAa,OAAO/d,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK4iB,QAAQ3f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIuC,uBAAyB,SAASzgB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIwC,4BAA8B,WAAa,OAAOje,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyC,qBAAuB,SAAS3gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIkR,EAAQ2O,IAAI0C,4BAA8B,SAAS5gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM6gB,KAEpC,EACItR,EAAQ2O,IAAI4C,4BAA8B,WAAa,OAAOre,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM6gB,OAEpC,GAAOvC,UAAU,EACb/O,EAAQ2O,IAAI6C,4BAA8B,SAAS/gB,GAE/C,OADY5E,EAAU4E,GAAMghB,IAEpC,EACIzR,EAAQ2O,IAAI+C,6BAA+B,SAASjhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAIiD,6BAA+B,SAASnhB,GAChD5E,EAAU4E,GAAMohB,OACxB,EACI7R,EAAQ2O,IAAImD,iCAAmC,WAAa,OAAO5e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOse,UAAU,EACb/O,EAAQ2O,IAAIoD,sBAAwB,SAASthB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIqD,4BAA8B,SAASvhB,GAE/C,OAAOtD,EADK8kB,EAAkBpe,OAAOpD,GAE7C,EACIuP,EAAQ2O,IAAIuD,4BAA8B,WAAa,OAAOhf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIwD,2BAA6B,SAAS1hB,EAAMC,GACpD2d,QAAQ+D,IAAIrlB,EAAmB0D,EAAMC,GAC7C,EACIsP,EAAQ2O,IAAI0D,qCAAuC,SAAS5hB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIuP,EAAQ2O,IAAI2D,2BAA6B,SAAS7hB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI+O,EAAQ2O,IAAI4D,sBAAwB,SAAS9hB,GAEzC,OAAOtD,EADKqlB,GAAY3e,OAAOpD,GAEvC,EACIuP,EAAQ2O,IAAI8D,2BAA6B,SAAShiB,GAE9C,OAAOtD,EADK8T,OAAOC,QAAQ,GAAIzQ,GAEvC,EACIuP,EAAQ2O,IAAI+D,kBAAoB,SAASjiB,GAErC,OAAOtD,EADKkJ,GAAQxC,OAAOpD,GAEnC,EACIuP,EAAQ2O,IAAIgE,kBAAoB,WAE5B,OAAOxlB,EADKylB,EAAWC,uBAE/B,EACI7S,EAAQ2O,IAAImE,kBAAoB,WAE5B,OAAO3lB,EADK3B,EAAKd,OAEzB,EACIsV,EAAQ2O,IAAIoE,mCAAqC,SAAStiB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIwM,EAAQ2O,IAAIqE,mBAAqB,SAASviB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACI0P,EAAQ2O,IAAIsE,2BAA6B,WAErC,OAAO9lB,EADK,IAAIzB,MAExB,EACIsU,EAAQ2O,IAAIuE,4BAA8B,SAASziB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIsP,EAAQ2O,IAAIwE,mCAAqC,WAAa,OAAOjgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM8d,cAEpC,GAAOQ,UAAU,EACb/O,EAAQ2O,IAAIyE,2BAA6B,SAAS3iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI0E,8BAAgC,SAAS5iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI2E,2BAA6B,SAAS7iB,EAAMC,GACpD,IACI,IAAI6iB,EAAS,CAACjjB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN4oB,CAAC/iB,EAAMC,KACb,MAAMJ,EAAIijB,EAAOjjB,EACjBijB,EAAOjjB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGijB,EAAOhjB,EAAGE,EAAMC,EAChE,CAAkB,QACE6iB,EAAOjjB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEmnB,EAAOjjB,EAAIijB,EAAOhjB,EAAI,CAClC,CACA,EACIyP,EAAQ2O,IAAI8E,sBAAwB,SAAShjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIuP,EAAQ2O,IAAI+E,2BAA6B,WAErC,OAAOvmB,EADK,IAAIT,MAExB,EACIsT,EAAQ2O,IAAIgF,6BAA+B,SAASljB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIiF,6BAA+B,SAASnjB,EAAMC,GACtD,IAAImjB,EACAC,EACJ,IACID,EAAcpjB,EACdqjB,EAAcpjB,EACd2d,QAAQ0F,MAAMhnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB4e,EAAaC,EAAa,EAC3D,CACA,EACI9T,EAAQ2O,IAAIqF,8BAAgC,SAASvjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACImT,EAAQ2O,IAAIsF,kDAAoD,SAASxjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI+O,EAAQ2O,IAAIuF,sCAAwC,WAAa,OAAOhhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM0jB,eAAehoB,EAAWuE,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyF,gCAAkC,SAAS3jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI+O,EAAQ2O,IAAI0F,uCAAyC,WAAa,OAAOnhB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM6jB,gBAAgBzoB,EAAU6E,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI4F,2BAA6B,SAAS9jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI+O,EAAQ2O,IAAI6F,8BAAgC,SAAS/jB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMgkB,OAEpC,EACIzU,EAAQ2O,IAAI+F,+BAAiC,SAASjkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMkkB,QAEpC,EACI3U,EAAQ2O,IAAIiG,gCAAkC,SAASnkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMokB,SAEpC,EACI7U,EAAQ2O,IAAImG,4BAA8B,SAASrkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMskB,KAEpC,EACI/U,EAAQ2O,IAAIqG,qBAAuB,SAASvkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIsG,+BAAiC,WAAa,OAAO/hB,GAAY,WAEzE,OAAO/F,EADK1C,OAAOyqB,QAE3B,GAAOnG,UAAU,EACb/O,EAAQ2O,IAAIwG,gCAAkC,SAAS1kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM2kB,SAEpC,EACIpV,EAAQ2O,IAAI0G,qCAAuC,SAAS5kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIuP,EAAQ2O,IAAI2G,8BAAgC,SAAS7kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI4G,2BAA6B,SAAS9kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIsP,EAAQ2O,IAAI6G,4BAA8B,WAAa,OAAOtiB,GAAY,WAEtE,OAAO/F,EADKsoB,KAAKA,KAEzB,GAAO1G,UAAU,EACb/O,EAAQ2O,IAAI+G,8BAAgC,WAAa,OAAOxiB,GAAY,WAExE,OAAO/F,EADKwoB,OAAOA,OAE3B,GAAO5G,UAAU,EACb/O,EAAQ2O,IAAIiH,kCAAoC,WAAa,OAAO1iB,GAAY,WAE5E,OAAO/F,EADK0oB,WAAWA,WAE/B,GAAO9G,UAAU,EACb/O,EAAQ2O,IAAImH,8BAAgC,WAAa,OAAO5iB,GAAY,WAExE,OAAO/F,EADK4oB,OAAOA,OAE3B,GAAOhH,UAAU,EACb/O,EAAQ2O,IAAIqH,wBAA0B,SAASvlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIuP,EAAQ2O,IAAIsH,iCAAmC,SAASxlB,EAAMC,GAE1D,OAAOvD,EADK,IAAI+oB,SAASnpB,EAAmB0D,EAAMC,IAE1D,EACIsP,EAAQ2O,IAAIwH,2BAA6B,WAAa,OAAOjjB,GAAY,SAAUzC,EAAMC,GAErF,OADYqf,QAAQqG,IAAIvqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI0H,6BAA+B,SAAS5lB,GAEhD,OAAOtD,EADKmpB,MAAMzqB,EAAU4E,IAEpC,EACIuP,EAAQ2O,IAAI4H,6BAA+B,SAAS9lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM6lB,MAAMzqB,EAAU6E,IAEpD,EACIsP,EAAQ2O,IAAI6H,wBAA0B,SAAS/lB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAI8H,iBAAmB,SAAShmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIsP,EAAQ2O,IAAI+H,mBAAqB,SAASjmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIuP,EAAQ2O,IAAIgI,4BAA8B,SAASlmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI+O,EAAQ2O,IAAIkI,4BAA8B,SAASpmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,IAEnD,EACIsP,EAAQ2O,IAAImI,sCAAwC,SAASrmB,GACzDsmB,eAAelrB,EAAU4E,GACjC,EACIuP,EAAQ2O,IAAIqI,sCAAwC,SAASvmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMsmB,eAEpC,EACI/W,EAAQ2O,IAAIsI,+BAAiC,SAASxmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIuP,EAAQ2O,IAAIuI,iCAAmC,WAE3C,OAAO/pB,EADKgqB,QAAQC,UAE5B,EACIpX,EAAQ2O,IAAI0I,2BAA6B,SAAS5mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI2I,iCAAmC,SAAS7mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKgqB,QAAQC,UAAUvrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI+O,EAAQ2O,IAAI4I,6BAA+B,SAAS9mB,GAEhD,OADY5E,EAAU4E,GAAMsd,KAEpC,EACI/N,EAAQ2O,IAAI6I,6BAA+B,SAAS/mB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAI8I,iCAAmC,SAAShnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC0pB,mBAAoB,6OAO7BlsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIgJ,2BAA6B,WAAa,OAAOzkB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIiJ,oCAAsC,SAASnnB,EAAMC,GAC7D7E,EAAU4E,GAAMonB,UAAYhsB,EAAU6E,EAC9C,EACIsP,EAAQ2O,IAAImJ,0BAA4B,SAASrnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMqsB,GAAGlsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI+O,EAAQ2O,IAAIqJ,mCAAqC,WAAa,OAAO9kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIsJ,4BAA8B,SAASxnB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMynB,KAEpC,EACIlY,EAAQ2O,IAAIwJ,yCAA2C,WAAa,OAAOjlB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIirB,QAAQrrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAI0J,oCAAsC,WAAa,OAAOnlB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM4nB,aAC5B,IAAI7gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOsX,UAAU,EACb/O,EAAQ2O,IAAI4J,+BAAiC,SAAS9nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACIgP,EAAQ2O,IAAI6J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWgP,CACX,CAEA,SAASyY,EAAkBzY,EAAS0Y,GAChC1Y,EAAQ2O,IAAIjkB,OAASguB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoB3nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS4nB,QAChBpG,EAAWC,uBAAyBpoB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAKytB,mBACEztB,CACX,CAEA,SAAS0tB,EAASzuB,EAAQiuB,GACtB,QAAa9sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMwU,EAAU0O,IAEhB+J,EAAkBzY,EAAS0Y,GAErBjuB,aAAkByjB,YAAYiL,SAChC1uB,EAAS,IAAIyjB,YAAYiL,OAAO1uB,IAKpC,OAAOsuB,EAFU,IAAI7K,YAAYO,SAAShkB,EAAQuV,GAEbvV,EACzC,CAEAsjB,eAAe6E,EAAWwG,EAAOV,GAC7B,QAAa9sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMwU,EAAU0O,KAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,EAAkBzY,EAAS0Y,GAE3B,MAAM,SAAEtnB,EAAQ,OAAE3G,SAAiBujB,QAAiBoL,EAAOpZ,GAE3D,OAAO+Y,EAAoB3nB,EAAU3G,EACzC,CAEA,IAAIuuB,EAAuBllB,OAAOwlB,OAAO,CACrCC,UAAW,KACX3lB,QAAS6I,EACTjH,UAAW1D,EACXgE,kBAAmBmc,EACnBhb,MAAOqQ,EACPjR,QAASA,GACT4B,SAAUuhB,GACVve,aAAcyF,GACd5E,WAAYzH,GACZkJ,qBAAsBR,GACtBgB,QAAS/L,GACTynB,eAAgBC,GAChB9V,WAAYpN,GACZkQ,iBAAkBiT,GAClBvS,gBAAiBhH,GACjBgI,UAAWhT,GACXsT,YAAa8J,GACbpJ,aAAcrX,GACd0b,QAAShZ,GACTmlB,QAAShH,EACTsG,SAAUA,EACVjmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMsoB,GAAY,wBC57Ib,MACD5mB,eAAgB6mB,GAAkB,QAClClmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACRgD,GAAY,QACZ8e,GAAO,WACPje,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACP6F,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZ/W,SD26IoB0b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY7qB,KAAK+qB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAevH,EAAYwH,SAG3BxH,EAAWwH,GAGdpB,CAAO,EC97IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,eAIvBtL,eAAe9a,EAAeqnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIT,IAAI,aAA+BiB,EACpE,C","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","__wbg_get_metadata_name","__wbg_set_metadata_name","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_call_b3ca7c6051f9bec1","__wbg_log_0159ca40cddf5b15","log","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbg_transaction_new","Transaction$1","__wbindgen_bigint_from_u64","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info"],"sourceRoot":""} \ No newline at end of file +{"version":3,"file":"933.bundle.js","mappings":"wOAAA,SAASA,EAAYC,EAAKC,EAAQC,EAAQC,GAClC,OAAO,IAAIC,SAASC,IAChB,MAAMC,EAAS,IAAIC,OAAOP,EAAK,CAC3BQ,KAAM,WAGVF,EAAOG,iBAAiB,WAAYC,IAGhCC,YAAW,KACPN,EAAQC,GAIJA,EAAOM,OACPN,EAAOM,OAC/B,GACmB,EAAE,GACN,CACCC,SAAS,EACTC,MAAM,IAGVR,EAAOS,YAAY,CACfd,SACAC,SACAC,WACF,GAEd,CAEA,IAAIa,E,qHAEJ,MAAMC,EAAO,IAAIC,MAAM,KAAKC,UAAKC,GAIjC,SAASC,EAAUC,GAAO,OAAOL,EAAKK,EAAK,CAF3CL,EAAKM,UAAKH,EAAW,MAAM,GAAM,GAIjC,IAAII,EAAYP,EAAKQ,OAErB,SAASC,EAAWJ,GACZA,EAAM,MACVL,EAAKK,GAAOE,EACZA,EAAYF,EAChB,CAEA,SAASK,EAAWL,GAChB,MAAMM,EAAMP,EAAUC,GAEtB,OADAI,EAAWJ,GACJM,CACX,CAEA,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,QAAS,CAAEC,WAAW,EAAMC,OAAO,IAAU,CAAEC,OAAQA,KAAQ,MAAMC,MAAM,4BAA4B,GAE5J,oBAAhBJ,aAA+BD,EAAkBI,SAC5D,IAAIE,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmBE,SAAWrB,EAAKd,OAAOmC,SACzEF,EAAqB,IAAIG,WAAWtB,EAAKd,OAAOmC,SAE7CF,CACX,CAEA,SAASI,EAAmBC,EAAKC,GAE7B,OADAD,KAAc,EACPX,EAAkBI,OAAOG,IAAkBM,MAAMF,EAAKA,EAAMC,GACvE,CAEA,SAASE,EAAcC,GACfpB,IAAcP,EAAKQ,QAAQR,EAAKM,KAAKN,EAAKQ,OAAS,GACvD,MAAMH,EAAME,EAIZ,OAHAA,EAAYP,EAAKK,GAEjBL,EAAKK,GAAOsB,EACLtB,CACX,CAEA,IAAIuB,EAAkB,EAEtB,MAAMC,EAA4C,oBAAhBC,YAA8B,IAAIA,YAAY,SAAW,CAAEC,OAAQA,KAAQ,MAAMd,MAAM,4BAA4B,GAE/Ie,EAAe,SAAUC,EAAKC,GAChC,MAAMC,EAAMN,EAAkBE,OAAOE,GAErC,OADAC,EAAKE,IAAID,GACF,CACHE,KAAMJ,EAAIzB,OACV8B,QAASH,EAAI3B,OAErB,EAEA,SAAS+B,EAAkBN,EAAKO,EAAQC,GAEpC,QAAgBtC,IAAZsC,EAAuB,CACvB,MAAMN,EAAMN,EAAkBE,OAAOE,GAC/BV,EAAMiB,EAAOL,EAAI3B,OAAQ,KAAO,EAGtC,OAFAW,IAAkBuB,SAASnB,EAAKA,EAAMY,EAAI3B,QAAQ4B,IAAID,GACtDP,EAAkBO,EAAI3B,OACfe,CACf,CAEI,IAAIC,EAAMS,EAAIzB,OACVe,EAAMiB,EAAOhB,EAAK,KAAO,EAE7B,MAAMmB,EAAMxB,IAEZ,IAAIyB,EAAS,EAEb,KAAOA,EAASpB,EAAKoB,IAAU,CAC3B,MAAMC,EAAOZ,EAAIa,WAAWF,GAC5B,GAAIC,EAAO,IAAM,MACjBF,EAAIpB,EAAMqB,GAAUC,CAC5B,CAEI,GAAID,IAAWpB,EAAK,CACD,IAAXoB,IACAX,EAAMA,EAAIR,MAAMmB,IAEpBrB,EAAMkB,EAAQlB,EAAKC,EAAKA,EAAMoB,EAAsB,EAAbX,EAAIzB,OAAY,KAAO,EAC9D,MAAM0B,EAAOf,IAAkBuB,SAASnB,EAAMqB,EAAQrB,EAAMC,GAG5DoB,GAFYZ,EAAaC,EAAKC,GAEhBI,QACdf,EAAMkB,EAAQlB,EAAKC,EAAKoB,EAAQ,KAAO,CAC/C,CAGI,OADAhB,EAAkBgB,EACXrB,CACX,CAEA,SAASwB,EAAWC,GAChB,OAAOA,OACX,CAEA,IAAIC,EAAqB,KAEzB,SAASC,IAIL,OAH2B,OAAvBD,GAA+BA,EAAmB7B,SAAWrB,EAAKd,OAAOmC,SACzE6B,EAAqB,IAAIE,WAAWpD,EAAKd,OAAOmC,SAE7C6B,CACX,CAEA,SAASG,EAAYC,GAEjB,MAAM9D,SAAc8D,EACpB,GAAY,UAAR9D,GAA4B,WAARA,GAA4B,MAAP8D,EACzC,MAAS,GAAEA,IAEf,GAAY,UAAR9D,EACA,MAAQ,IAAG8D,KAEf,GAAY,UAAR9D,EAAkB,CAClB,MAAM+D,EAAcD,EAAIC,YACxB,OAAmB,MAAfA,EACO,SAEC,UAASA,IAE7B,CACI,GAAY,YAAR/D,EAAoB,CACpB,MAAMgE,EAAOF,EAAIE,KACjB,MAAmB,iBAARA,GAAoBA,EAAK/C,OAAS,EACjC,YAAW+C,KAEZ,UAEnB,CAEI,GAAItD,MAAMuD,QAAQH,GAAM,CACpB,MAAM7C,EAAS6C,EAAI7C,OACnB,IAAIiD,EAAQ,IACRjD,EAAS,IACTiD,GAASL,EAAYC,EAAI,KAE7B,IAAI,IAAIK,EAAI,EAAGA,EAAIlD,EAAQkD,IACvBD,GAAS,KAAOL,EAAYC,EAAIK,IAGpC,OADAD,GAAS,IACFA,CACf,CAEI,MAAME,EAAiB,sBAAsBC,KAAKC,SAASC,KAAKT,IAChE,IAAIU,EACJ,KAAIJ,EAAenD,OAAS,GAIxB,OAAOqD,SAASC,KAAKT,GAEzB,GALIU,EAAYJ,EAAe,GAKd,UAAbI,EAIA,IACI,MAAO,UAAYC,KAAKC,UAAUZ,GAAO,GACrD,CAAU,MAAOa,GACL,MAAO,QACnB,CAGI,OAAIb,aAAepC,MACP,GAAEoC,EAAIE,SAASF,EAAIc,YAAYd,EAAIe,QAGxCL,CACX,CAEA,MAAMM,EAAiD,oBAAzBC,qBACxB,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqBG,IAC3B1E,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC0E,EAAMI,EAAGJ,EAAMK,EAAE,IAG9D,SAASC,EAAeC,EAAMC,EAAML,EAAMM,GACtC,MAAMT,EAAQ,CAAEI,EAAGG,EAAMF,EAAGG,EAAME,IAAK,EAAGP,QACpCQ,EAAOA,IAAIC,KAIbZ,EAAMU,MACN,MAAMN,EAAIJ,EAAMI,EAChBJ,EAAMI,EAAI,EACV,IACI,OAAOK,EAAEL,EAAGJ,EAAMK,KAAMO,EACpC,CAAU,QACsB,KAAdZ,EAAMU,KACRpF,EAAK2E,oBAAoBC,IAAIF,EAAMG,KAAnC7E,CAAyC8E,EAAGJ,EAAMK,GAClDT,EAAcG,WAAWC,IAEzBA,EAAMI,EAAIA,CAE1B,GAII,OAFAO,EAAKE,SAAWb,EAChBJ,EAAcE,SAASa,EAAMX,EAAOA,GAC7BW,CACX,CACA,SAASG,EAAiBP,EAAMC,EAAMO,GAClCzF,EAAK0F,6HAA6HT,EAAMC,EAAMvD,EAAc8D,GAChK,CAEA,SAASE,EAAaC,EAAUC,GAC5B,KAAMD,aAAoBC,GACtB,MAAM,IAAI3E,MAAO,wBAAuB2E,EAAMrC,QAElD,OAAOoC,EAASpE,GACpB,CAEA,SAASsE,EAAkB5D,EAAKO,GAC5B,MAAMjB,EAAMiB,EAAoB,EAAbP,EAAIzB,OAAY,KAAO,EAG1C,OAFAW,IAAkBiB,IAAIH,EAAKV,EAAM,GACjCK,EAAkBK,EAAIzB,OACfe,CACX,CAiBA,SAASuE,EAAwBC,EAAWC,EAAeC,EAASC,GAChE,IACI,MAAMC,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaK,EAAWM,GACxBX,EAAaM,EAAeM,IAC5BZ,EAAaO,EAASM,IACtB,MAAMC,EAAOjE,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK6G,wBAAwBT,EAAQJ,EAAUc,UAAWb,EAAca,UAAWZ,EAAQY,UAAWL,EAAMG,GAC5G,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAc,IAAPD,CACf,CAAM,QACE/G,EAAKqG,gCAAgC,GAC7C,CACA,CAEA,IAAIY,EAAwB,KAE5B,SAASC,IAIL,OAH8B,OAA1BD,GAAkCA,EAAsB5F,SAAWrB,EAAKd,OAAOmC,SAC/E4F,EAAwB,IAAIE,cAAcnH,EAAKd,OAAOmC,SAEnD4F,CACX,CAEA,SAASG,EAAoB5F,EAAKC,GAE9B,OADAD,KAAc,EACPJ,IAAkBuB,SAASnB,EAAM,EAAGA,EAAM,EAAIC,EACzD,CAIA,SAAS4F,EAAeC,GACpBtH,EAAKqH,eAAeC,EACxB,CAOA,SAASC,EAAevI,EAAKwI,GAEzB,OAAO7G,EADKX,EAAKyH,eAAe9F,EAAc3C,GAAMwI,GAExD,CAEA,SAASE,EAAYvC,EAAGG,GACpB,IACI,OAAOH,EAAEwC,MAAMC,KAAMtC,EAC7B,CAAM,MAAOuC,GACL7H,EAAK8H,qBAAqBnG,EAAckG,GAChD,CACA,CACA,SAASE,EAAkB9C,EAAMC,EAAMO,EAAMuC,GACzChI,EAAKiI,gEAAgEhD,EAAMC,EAAMvD,EAAc8D,GAAO9D,EAAcqG,GACxH,CAEA,MAAME,EAAuD,oBAAzB3D,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmI,mBAAmB3G,IAAQ,K,MAItE,MAAM4G,EAEF,aAAOC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOH,EAAQI,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB0G,EAAoB1D,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoB,EAAoBzD,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmI,mBAAmB3G,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8I,yBAAyBF,EAAY9B,WACtD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,oBAAOmI,CAAcC,GACjBrD,EAAaqD,EAAUC,IACvB,MAAMrI,EAAMZ,EAAKkJ,sBAAsBF,EAASlC,WAChD,OAAOsB,EAAQC,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYhK,GACf,MAAMsH,EAAOjE,EAAkBrD,EAASa,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPjB,EAAMZ,EAAKoJ,oBAAoB3C,EAAMG,GAC3C,OAAOwB,EAAQC,OAAOzH,EAC9B,CAQIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwJ,kBAAkBpD,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUIG,MAAAA,CAAOtF,EAASuF,GACZ,MAAMlD,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACb8D,EAAagE,EAAWC,IAExB,OAAe,IADH5J,EAAK6J,eAAejC,KAAKd,UAAWL,EAAMG,EAAM+C,EAAU7C,UAE9E,GAGA,MAAMgD,EAAyD,oBAAzBvF,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK+J,qBAAqBvI,IAAQ,K,MAIxE,MAAMwI,EAEF,aAAO3B,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOyB,EAAUxB,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBsI,EAAsBtF,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBgD,EAAsBrF,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK+J,qBAAqBvI,EAClC,CAKIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiK,mBAAmB7D,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWlE,GACd,IACI,MAAMI,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBwD,EAAWhG,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACb7B,EAAKmK,qBAAqB/D,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgD,EAAU3B,OAAOtB,EACpC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+D,EAAiE,oBAAzB7F,qBACxC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqK,6BAA6B7I,IAAQ,K,MAOhF,MAAM8I,EAEF,aAAOjC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+B,EAAkB9B,WAG5C,OAFA5G,EAAIkF,UAAYtF,EAChB4I,EAA8B5F,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACpDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsD,EAA8B3F,WAAWmD,MAClCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqK,6BAA6B7I,EAC1C,CAOI+I,UAAAA,GAEI,OAAO5J,EADKX,EAAKwK,6BAA6B5C,KAAKd,WAE3D,CAOI2D,YAAAA,GACI,MAAM7J,EAAMZ,EAAK0K,+BAA+B9C,KAAKd,WACrD,OAAe,IAARlG,OAAYR,EAAYkG,EAAU+B,OAAOzH,EACxD,CAKI+J,OAAAA,GACI,IACI,MAAMvE,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4K,0BAA0BxE,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6D,GAAQxC,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyE,aAAAA,GACI,MAAMlK,EAAMZ,EAAK+K,gCAAgCnD,KAAKd,WACtD,OAAe,IAARlG,OAAYR,EAAY4K,GAAW3C,OAAOzH,EACzD,CAOIqK,eAAAA,GACI,MAAMrK,EAAMZ,EAAKkL,kCAAkCtD,KAAKd,WACxD,OAAOP,GAAa8B,OAAOzH,EACnC,CAKIuK,aAAAA,GACI,IAAI7B,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoL,gCAAgChF,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI8B,UAAAA,GACI,MAAMzK,EAAMZ,EAAKsL,6BAA6B1D,KAAKd,WACnD,OAAON,GAAQ6B,OAAOzH,EAC9B,GAGA,MAAM2K,EAAqD,oBAAzBhH,qBAC5B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwL,iBAAiBhK,IAAQ,K,MAGpE,MAAMiK,EAEF,aAAOpD,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkD,EAAMjD,WAGhC,OAFA5G,EAAIkF,UAAYtF,EAChB+J,EAAkB/G,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACxCA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByE,EAAkB9G,WAAWmD,MACtBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwL,iBAAiBhK,EAC9B,CAIIsC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0L,eAAetF,EAAQwB,KAAKd,WACjC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAKI,iBAAOW,CAAWyB,GACd,IACI,MAAMvF,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmJ,EAAO3L,EAAK0G,kBAAmB1G,EAAK2G,oBAC7DC,EAAO/E,EACb7B,EAAK4L,iBAAiBxF,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyE,EAAMpD,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwF,EAAuD,oBAAzBtH,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8L,mBAAmBtK,IAAQ,KAItE,MAAMqJ,GAEF,aAAOxC,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOsC,GAAQrC,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBqK,EAAoBrH,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+E,EAAoBpH,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8L,mBAAmBtK,EAChC,CAUIuK,WAAAA,CAAYC,EAAa/F,GACrBN,EAAaqG,EAAahB,IAC1B,IAAIvE,EAAOuF,EAAYvD,qBACvB9C,EAAaM,EAAeM,IAC5B,IAAI0F,EAAOhG,EAAcwC,qBACzB,MAAM7H,EAAMZ,EAAKkM,YAAYzF,EAAMwF,GAEnC,OADArE,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CAOIuE,UAAAA,GACI,IACI,MAAM/F,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoM,mBAAmBhG,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOgE,GAAW3C,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIgG,YAAAA,GACI,IACI,MAAMjG,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKsM,qBAAqBlG,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOT,GAAa8B,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,EAGA,MAAMkG,GAAwD,oBAAzBhI,qBAC/B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwM,oBAAoBhL,IAAQ,K,OAGvE,MAAMiL,EAEF,aAAOpE,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkE,EAASjE,WAGnC,OAFA5G,EAAIkF,UAAYtF,EAChB+K,GAAqB/H,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC3CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByF,GAAqB9H,WAAWmD,MACzBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwM,oBAAoBhL,EACjC,CAII,QAAIgC,GACA,IAAI8F,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK0M,wBAAwBtG,EAAQwB,KAAKd,WAC1C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,QAAI/F,CAAKyB,GACL,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK2M,wBAAwB/E,KAAKd,UAAWL,EAAMG,EAC3D,CAII,WAAIgG,GACA,IAAItD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6M,2BAA2BzG,EAAQwB,KAAKd,WAC7C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,WAAIqD,CAAQ3H,GACR,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAK8M,2BAA2BlF,KAAKd,UAAWL,EAAMG,EAC9D,CAII,UAAImG,GACA,IAAIzD,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgN,0BAA0B5G,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,UAAIwD,CAAO9H,GACP,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKiN,0BAA0BrF,KAAKd,UAAWL,EAAMG,EAC7D,CAII,YAAIsG,GACA,IAAI5D,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmN,4BAA4B/G,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,YAAI2D,CAASjI,GACT,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKoN,4BAA4BxF,KAAKd,UAAWL,EAAMG,EAC/D,CAII,gBAAIyF,GACA,IAAI/C,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqN,gCAAgCjH,EAAQwB,KAAKd,WAClD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,gBAAI8C,CAAapH,GACb,MAAMwB,EAAOjE,EAAkByC,EAAMjF,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKsN,gCAAgC1F,KAAKd,UAAWL,EAAMG,EACnE,CAII,cAAO2G,GACH,IAAIjE,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKwN,iBAAiBpH,GACtB,IAAIW,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAII,kBAAOkE,GACH,MAAM7M,EAAMZ,EAAK0N,uBACjB,OAAOjB,EAASpE,OAAOzH,EAC/B,CAII,qBAAO+M,GACH,MAAM/M,EAAMZ,EAAK4N,0BACjB,OAAOnB,EAASpE,OAAOzH,EAC/B,CAII,0BAAOiN,GACH,MAAMjN,EAAMZ,EAAK8N,+BACjB,OAAOrB,EAASpE,OAAOzH,EAC/B,CAII,kBAAOmN,GACH,MAAMnN,EAAMZ,EAAKgO,uBACjB,OAAOvB,EAASpE,OAAOzH,EAC/B,CAII,iBAAOqN,GACH,MAAMrN,EAAMZ,EAAKkO,sBACjB,OAAOzB,EAASpE,OAAOzH,EAC/B,CAII,gBAAOuN,GACH,MAAMvN,EAAMZ,EAAKoO,qBACjB,OAAO3B,EAASpE,OAAOzH,EAC/B,CAII,WAAOyN,GACH,MAAMzN,EAAMZ,EAAKsO,gBACjB,OAAO7B,EAASpE,OAAOzH,EAC/B,CAII,0BAAO2N,GACH,MAAM3N,EAAMZ,EAAKwO,+BACjB,OAAO/B,EAASpE,OAAOzH,EAC/B,CAII,YAAO6N,GACH,MAAM7N,EAAMZ,EAAK0O,iBACjB,OAAOjC,EAASpE,OAAOzH,EAC/B,CAII,uBAAO+N,GACH,MAAM/N,EAAMZ,EAAK4O,4BACjB,OAAOnC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOiO,GACH,MAAMjO,EAAMZ,EAAK8O,sCACjB,OAAOrC,EAASpE,OAAOzH,EAC/B,CAII,sBAAOmO,GACH,MAAMnO,EAAMZ,EAAKgP,2BACjB,OAAOvC,EAASpE,OAAOzH,EAC/B,CAII,gCAAOqO,GACH,MAAMrO,EAAMZ,EAAKkP,qCACjB,OAAOzC,EAASpE,OAAOzH,EAC/B,CAII,iCAAOuO,GACH,MAAMvO,EAAMZ,EAAKoP,sCACjB,OAAO3C,EAASpE,OAAOzH,EAC/B,CAII,oBAAOyO,GACH,MAAMzO,EAAMZ,EAAKsP,yBACjB,OAAO7C,EAASpE,OAAOzH,EAC/B,GAGA,MAAM2O,GAA4D,oBAAzBhL,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKwP,wBAAwBhO,IAAQ,K,OAK3E,MAAMiO,EAEF,aAAOpH,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOkH,EAAajH,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChB+N,GAAyB/K,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjByI,GAAyB9K,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKwP,wBAAwBhO,EACrC,CAKIuK,WAAAA,CAAY2D,GACR,IACI,MAAMtJ,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkN,EAAY1P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAK2P,iBAAiBvJ,EAAQK,EAAMG,GACpC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAGrB,OADAY,KAAKd,UAAYC,IAAO,EACjBa,IACnB,CAAU,QACE5H,EAAKqG,gCAAgC,GACjD,CACA,CASIuJ,YAAAA,CAAaC,EAAYC,GACrB,IACI,MAAM1J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBqN,EAAY7P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkBsN,EAAY9P,EAAK0G,kBAAmB1G,EAAK2G,oBAClEoJ,EAAOlO,EACb7B,EAAKgQ,0BAA0B5J,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzE,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWoG,EAEjC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAKIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKiQ,sBAAsB7J,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAMI,iBAAOW,CAAWgG,GACd,IACI,MAAM9J,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0N,EAAGlQ,EAAK0G,kBAAmB1G,EAAK2G,oBACzDC,EAAO/E,EACb7B,EAAKmQ,wBAAwB/J,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOyI,EAAapH,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAM+J,GAA0D,oBAAzB7L,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKqQ,sBAAsB7O,IAAQ,K,OAIzE,MAAM8O,EAEF,aAAOjI,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO+H,EAAW9H,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB4O,GAAuB5L,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBsJ,GAAuB3L,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKqQ,sBAAsB7O,EACnC,CAMIuK,WAAAA,GACI,MAAMnL,EAAMZ,EAAKuQ,iBAEjB,OADA3I,KAAKd,UAAYlG,IAAQ,EAClBgH,IACf,CASI,0BAAO4I,CAAoBC,GACvB,MAAMhK,EAAOX,EAAkB2K,EAAMzQ,EAAK0G,mBACpCE,EAAO/E,EACPjB,EAAMZ,EAAK0Q,+BAA+BjK,EAAMG,GACtD,OAAO0J,EAAWjI,OAAOzH,EACjC,CASI,kBAAOuI,CAAYP,GACf,IACI,MAAMxC,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoG,EAAa5I,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAK2Q,uBAAuBvK,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIgD,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4Q,qBAAqBxK,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIsH,WAAAA,GACI,MAAMjQ,EAAMZ,EAAK8Q,uBAAuBlJ,KAAKd,WAC7C,OAAOmC,GAAQZ,OAAOzH,EAC9B,CAOImQ,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKgR,sBAAsBpJ,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASIsQ,IAAAA,CAAK9M,GACD,MAAMqC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvJ,KAAKd,UAAWL,EAAMG,GACvD,OAAOgD,GAAUvB,OAAOzH,EAChC,CAUI,mBAAOwQ,CAAaC,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKsR,wBAAwBlL,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUImL,YAAAA,CAAaH,GACT,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwB,KAAKd,UAAWL,EAAMG,GAC3D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuK,GAAqBlJ,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAWI,+BAAOqL,CAAyBC,EAAYN,GACxC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAagM,EAAYJ,IACzB,MAAM9K,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4R,oCAAoCxL,EAAQuL,EAAW7K,UAAWL,EAAMG,GAC7E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOsJ,EAAWjI,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMwL,GAAoE,oBAAzBtN,qBAC3C,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK8R,gCAAgCtQ,IAAQ,K,OAInF,MAAMuQ,EAEF,aAAO1J,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOwJ,EAAqBvJ,WAG/C,OAFA5G,EAAIkF,UAAYtF,EAChBqQ,GAAiCrN,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACvDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB+K,GAAiCpN,WAAWmD,MACrCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK8R,gCAAgCtQ,EAC7C,CAYI,wBAAOwQ,CAAkBpJ,EAAayI,GAClC,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKyR,wBAAwBrL,EAAQwC,EAAY9B,UAAWL,EAAMG,GAClE,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAUI4L,mBAAAA,CAAoBZ,GAChB,IACI,MAAMjL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB6O,EAAQrR,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKkS,yCAAyC9L,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5E,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO6B,GAAWR,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmS,8BAA8B/L,EAAQwB,KAAKd,WAChD,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASI,iBAAOW,CAAWyH,GACd,IACI,MAAMvL,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKoS,gCAAgChM,EAAQK,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO+K,EAAqB1J,OAAOtB,EAC/C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,GAGA,MAAMgM,GAAuD,oBAAzB9N,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKsS,mBAAmB9Q,IAAQ,K,OAItE,MAAM+Q,EAEF,aAAOlK,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOgK,EAAQ/J,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChB6Q,GAAoB7N,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBuL,GAAoB5N,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKsS,mBAAmB9Q,EAChC,CASI,iBAAO0I,CAAWhE,GACd,IACI,MAAME,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb7B,EAAKwS,mBAAmBpM,EAAQK,EAAMG,GACtC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOuL,EAAQlK,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyS,iBAAiBrM,EAAQwB,KAAKd,WACnC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CASImJ,WAAAA,CAAYC,GACR,MAAMlM,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EAEb,OAAe,IADH7B,EAAK4S,oBAAoBhL,KAAKd,UAAWL,EAAMG,EAEnE,CAuBIiM,YAAAA,GAEI,OAAOlS,EADKX,EAAK8S,qBAAqBlL,KAAKd,WAEnD,CAyCIiM,iBAAAA,CAAkBJ,GACd,IACI,MAAMvM,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmQ,EAAe3S,EAAK0G,kBAAmB1G,EAAK2G,oBACrEC,EAAO/E,EACb7B,EAAKgT,0BAA0B5M,EAAQwB,KAAKd,UAAWL,EAAMG,GAC7D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAqBI4M,WAAAA,GACI,IACI,MAAM7M,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKkT,oBAAoB9M,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAgCI8M,gBAAAA,CAAiBC,GACb,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKqT,yBAAyBjN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAmDIiN,gBAAAA,CAAiBC,GACb,IACI,MAAMnN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB+Q,EAAavT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKwT,yBAAyBpN,EAAQwB,KAAKd,UAAWL,EAAMG,GAC5D,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOrG,EAAWoG,EAC9B,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOI,wBAAOoN,GACH,MAAM7S,EAAMZ,EAAK0T,4BACjB,OAAOnB,EAAQlK,OAAOzH,EAC9B,CAOI+S,EAAAA,GACI,IAAIrK,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK4T,WAAWxN,EAAQwB,KAAKd,WAC7B,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIpK,OAAAA,GACI,IACI,MAAMiH,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6T,gBAAgBzN,EAAQwB,KAAKd,WAClC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOiK,EAAQ5I,OAAOtB,EAClC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASIyN,OAAAA,CAAQC,GACJpO,EAAaoO,EAAOxB,GAEpB,OAAe,IADHvS,EAAKgU,gBAAgBpM,KAAKd,UAAWiN,EAAMjN,UAE/D,CA0BImN,UAAAA,GAEI,OAAOtT,EADKX,EAAKkU,mBAAmBtM,KAAKd,WAEjD,GAGA,MAAMqN,GAA8D,oBAAzB5P,qBACrC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKoU,0BAA0B5S,IAAQ,K,OAG7E,MAEIiH,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBqN,GAA2B1P,WAAWmD,MAC/BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKoU,0BAA0B5S,EACvC,CA8BI,iCAAO6S,CAA2BzL,EAAa1C,EAASoO,EAAaC,EAAYvV,EAAKwV,EAASC,EAAiBC,EAAmBC,GAC/HhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACb,IAAIoK,EAAO,EACNjJ,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzB3I,EAAOsI,EAAW9L,sBAEtB,IAAIoM,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9B+J,EAAON,EAAgBhM,sBAE3B,IAAIuM,EAAO,EACNhS,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChCyO,EAAON,EAAkBjM,sBAE7B,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKmV,0CAA0CvM,EAAY9B,UAAWL,EAAMG,EAAM0N,EAAarI,EAAM4I,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAEnM,CAeI,4BAAOG,CAAsBlP,EAASsO,GAClC,MAAM/N,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EAEb,OAAOlB,EADKX,EAAKqV,qCAAqC5O,EAAMG,EAAM5D,EAAWwR,GAAW,EAAI7S,EAAc6S,IAElH,CAaI,8BAAOc,CAAwB9R,GAC3B,IACI,MAAM4C,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBgB,EAAMxD,EAAK0G,kBAAmB1G,EAAK2G,oBAC5DC,EAAO/E,EACb7B,EAAKuV,uCAAuCnP,EAAQK,EAAMG,GAC1D,IAAIG,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAiCI,6BAAOsP,CAAuB/M,EAAa1C,EAAS0P,EAAWC,EAAQC,EAAiBC,EAAOvB,EAASxI,EAAa/F,EAAejH,EAAK2V,GACrIhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B6J,EAAO7I,EAAYvD,sBAEvB,IAAIsM,EAAO,EACN/R,EAAWiD,KACZN,EAAaM,EAAeM,IAC5BwO,EAAO9O,EAAcwC,sBAEzB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiW,sCAAsCrN,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASC,EAAiBC,EAAO/S,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUK,EAAME,EAAMC,EAAMgB,EAAMf,GAEvO,CAsCI,gCAAOiB,CAA0BtN,EAAa1C,EAAS0P,EAAWC,EAAQvB,EAAaC,EAAYvV,EAAKwV,EAASxI,EAAa/F,EAAewO,EAAiBC,EAAmBC,GAC7KhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1BgK,EAAOhJ,EAAYvD,sBAEvB,IAAIwM,EAAO,EACNjS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5B0O,EAAOhP,EAAcwC,sBAEzB,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuW,yCAAyC3N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAASvB,EAAaO,EAAME,EAAMoB,EAAMnT,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUQ,EAAMC,EAAMmB,EAAMC,EAAMC,GAEjP,CA8BI,2BAAOE,CAAqB5N,EAAa1C,EAAS0P,EAAWC,EAAQ7W,EAAKwV,EAASxI,EAAa/F,EAAe0O,GAC3GhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb,IAAIgT,EAAO7R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFmO,EAAOjT,EACX,IAAIkT,EAAO,EACN/R,EAAWgJ,KACZrG,EAAaqG,EAAahB,IAC1B+J,EAAO/I,EAAYvD,sBAEvB,IAAIuM,EAAO,EACNhS,EAAWiD,KACZN,EAAaM,EAAeM,IAC5ByO,EAAO/O,EAAcwC,sBAEzB,IAAIwM,EAAO,EACNjS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BD,EAAON,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKyW,oCAAoC7N,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAShB,EAAMC,EAAM9R,EAAWwR,GAAW,EAAI7S,EAAc6S,GAAUO,EAAMC,EAAMC,GAE7M,CAeI,0BAAOyB,CAAoBxQ,EAAS0P,GAChC,IACI,MAAMxP,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkBoT,EAAW5V,EAAK0G,kBAAmB1G,EAAK2G,oBACjEoJ,EAAOlO,EACb7B,EAAK2W,mCAAmCvQ,EAAQK,EAAMG,EAAMqF,EAAM8D,GAClE,IAAIhJ,EAAKG,IAAqBd,EAAS,EAAI,GACvCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,OAAOC,OAAOC,QAAQ,GAAI3O,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CA6BI,2BAAOuQ,CAAqBhO,EAAaiO,EAAUC,EAAUxC,EAAaC,EAAYvV,EAAK+X,EAAkBC,EAAoBvC,EAAiBC,EAAmBC,GACjKhP,EAAaiD,EAAaC,IAC1BlD,EAAakR,EAAUjC,IACvB,IAAInO,EAAOoQ,EAASpO,qBACpB9C,EAAamR,EAAUlC,IACvB,IAAI3I,EAAO6K,EAASrO,qBACpB,IAAIoM,EAAO,EACN7R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBC,EAAON,EAAW9L,sBAEtB,IAAIsM,EAAO/R,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFwP,EAAOtU,EACX,IAAImT,EAAO,EACNhS,EAAW+T,KACZpR,EAAaoR,EAAkB/L,IAC/BgK,EAAO+B,EAAiBtO,sBAE5B,IAAIwM,EAAO,EACNjS,EAAWgU,KACZrR,EAAaqR,EAAoBzQ,IACjC0O,EAAO+B,EAAmBvO,sBAE9B,IAAI2N,EAAO,EACNpT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BoL,EAAO3B,EAAgBhM,sBAE3B,IAAI4N,EAAO,EACNrT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC8P,EAAO3B,EAAkBjM,sBAE7B,IAAI6N,EAAO,EACNtT,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BoB,EAAO3B,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKiX,oCAAoCrO,EAAY9B,UAAWL,EAAMwF,EAAMqI,EAAaO,EAAME,EAAMoB,EAAMnB,EAAMC,EAAMmB,EAAMC,EAAMC,GAEvJ,CAqBI,4BAAOY,CAAsBtO,EAAauO,EAAcC,EAAepY,EAAKqY,EAAmBC,EAAqB3C,GAChHhP,EAAaiD,EAAaC,IAC1BlD,EAAayR,EAAexC,IAC5B,IAAInO,EAAO2Q,EAAc3O,qBACrBwD,EAAOjJ,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACX,IAAIgT,EAAO,EACN7R,EAAWqU,KACZ1R,EAAa0R,EAAmBrM,IAChC6J,EAAOwC,EAAkB5O,sBAE7B,IAAIsM,EAAO,EACN/R,EAAWsU,KACZ3R,EAAa2R,EAAqB/Q,IAClCwO,EAAOuC,EAAoB7O,sBAE/B,IAAIuM,EAAO,EACNhS,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5BF,EAAOL,EAAclM,sBAGzB,OAAO9H,EADKX,EAAKuX,qCAAqC3O,EAAY9B,UAAWqQ,EAAc1Q,EAAMwF,EAAM8D,EAAM8E,EAAME,EAAMC,GAEjI,CAgCI,+BAAOwC,CAAyB5O,EAAa6O,EAAgBC,EAAWC,EAAeP,EAAe9C,EAAaC,EAAYvV,EAAK4Y,EAAsBC,EAAwBpD,EAAiBC,EAAmBC,GAClNhP,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBkV,EAAW1X,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPoK,EAAOzJ,EAAkBmV,EAAe3X,EAAK0G,kBAAmB1G,EAAK2G,oBACrEoJ,EAAOlO,EACb,IAAIgT,EAAO,EACN7R,EAAWoU,KACZzR,EAAayR,EAAexC,IAC5BC,EAAOuC,EAAc3O,sBAEzB,IAAIsM,EAAO,EACN/R,EAAWuR,KACZ5O,EAAa4O,EAAYK,IACzBG,EAAOR,EAAW9L,sBAEtB,IAAIuM,EAAOhS,EAAWhE,GAAO,EAAIwD,EAAkBxD,EAAKgB,EAAK0G,kBAAmB1G,EAAK2G,oBACjFqP,EAAOnU,EACX,IAAIoT,EAAO,EACNjS,EAAW4U,KACZjS,EAAaiS,EAAsB5M,IACnCiK,EAAO2C,EAAqBnP,sBAEhC,IAAI2N,EAAO,EACNpT,EAAW6U,KACZlS,EAAakS,EAAwBtR,IACrC6P,EAAOyB,EAAuBpP,sBAElC,IAAI4N,EAAO,EACNrT,EAAWyR,KACZ9O,EAAa8O,EAAiBzJ,IAC9BqL,EAAO5B,EAAgBhM,sBAE3B,IAAI6N,EAAO,EACNtT,EAAW0R,KACZ/O,EAAa+O,EAAmBnO,IAChC+P,EAAO5B,EAAkBjM,sBAE7B,IAAIqP,EAAO,EACN9U,EAAW2R,KACZhP,EAAagP,EAAeO,IAC5B4C,EAAOnD,EAAclM,sBAGzB,OAAO9H,EADKX,EAAK+X,wCAAwCnP,EAAY9B,UAAW2Q,EAAgBhR,EAAMG,EAAMqF,EAAM8D,EAAM8E,EAAMP,EAAaS,EAAMC,EAAMgB,EAAMf,EAAMmB,EAAMC,EAAMC,EAAMwB,GAE7L,CAeI,wBAAOE,CAAkBpP,EAAa1C,EAASC,EAAa0P,EAAQrB,GAChE7O,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkB0D,EAASlG,EAAK0G,kBAAmB1G,EAAK2G,oBAC/DC,EAAO/E,EACPoK,EAAOzJ,EAAkB2D,EAAanG,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EAEb,OAAOlB,EADKX,EAAKiY,iCAAiCrP,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,EAAMpO,EAAckU,GAAS7S,EAAWwR,GAAW,EAAI7S,EAAc6S,IAExK,GAGA,MAAM0D,GAA0D,oBAAzB3T,qBACjC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKmY,sBAAsB3W,IAAQ,K,OAIzE,MAAM4W,EAEF,aAAO/P,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO6P,EAAW5P,WAGrC,OAFA5G,EAAIkF,UAAYtF,EAChB0W,GAAuB1T,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC7CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBoR,GAAuBzT,WAAWmD,MAC3BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKmY,sBAAsB3W,EACnC,CAWI6W,kBAAAA,GAEI,OAAe,IADHrY,EAAKsY,8BAA8B1Q,KAAKd,UAE5D,CAWIyR,qBAAAA,GAEI,OAAe,IADHvY,EAAKwY,iCAAiC5Q,KAAKd,UAE/D,CAWI2R,yBAAAA,GAEI,OAAe,IADHzY,EAAK0Y,qCAAqC9Q,KAAKd,UAEnE,CAWI6R,kBAAAA,GAEI,OAAe,IADH3Y,EAAK4Y,8BAA8BhR,KAAKd,UAE5D,CAWI+R,iBAAAA,GAEI,OAAe,IADH7Y,EAAK8Y,6BAA6BlR,KAAKd,UAE3D,CAWIiS,iBAAAA,GAEI,OAAe,IADH/Y,EAAKgZ,6BAA6BpR,KAAKd,UAE3D,CAWImS,YAAAA,GAEI,OAAe,IADHjZ,EAAKkZ,wBAAwBtR,KAAKd,UAEtD,CAWIqS,yBAAAA,GAEI,OAAe,IADHnZ,EAAKoZ,qCAAqCxR,KAAKd,UAEnE,CAWIuS,aAAAA,GAEI,OAAe,IADHrZ,EAAKsZ,yBAAyB1R,KAAKd,UAEvD,CAWIyS,uBAAAA,GAEI,OAAe,IADHvZ,EAAKwZ,mCAAmC5R,KAAKd,UAEjE,CAWI2S,+BAAAA,GAEI,OAAe,IADHzZ,EAAK0Z,2CAA2C9R,KAAKd,UAEzE,CAWI6S,sBAAAA,GAEI,OAAe,IADH3Z,EAAK4Z,kCAAkChS,KAAKd,UAEhE,CAWI+S,8BAAAA,GAEI,OAAe,IADH7Z,EAAK8Z,0CAA0ClS,KAAKd,UAExE,CAWIiT,+BAAAA,GAEI,OAAe,IADH/Z,EAAKga,2CAA2CpS,KAAKd,UAEzE,CAWImT,oBAAAA,GAEI,OAAe,IADHja,EAAKka,gCAAgCtS,KAAKd,UAE9D,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoa,oBAAoBhU,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAKsa,gBAAgB1S,KAAKd,WACtC,OAAOsR,EAAW/P,OAAOzH,EACjC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAKya,qBAAqBrU,EAAQK,EAAMG,GACxC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK2a,sBAAsBvU,EAAQK,EAAMG,GACzC,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOoR,EAAW/P,OAAOtB,EACrC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6a,mBAAmBzU,EAAQwB,KAAKd,WACrC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+a,oBAAoB3U,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyR,GAAgE,oBAAzBzW,qBACvC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKib,4BAA4BzZ,IAAQ,K,OAI/E,MAAM0Z,EAEF,aAAO7S,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2S,EAAiB1S,WAG3C,OAFA5G,EAAIkF,UAAYtF,EAChBwZ,GAA6BxW,SAAS5C,EAAKA,EAAIkF,UAAWlF,GACnDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkU,GAA6BvW,WAAWmD,MACjCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKib,4BAA4BzZ,EACzC,CASI,iBAAO0I,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAKob,4BAA4BhV,EAAQK,EAAMG,GAC/C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkU,EAAiB7S,OAAOtB,EAC3C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqb,0BAA0BjV,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAUI+R,OAAAA,CAAQtS,GACJ,IACI,MAAM5C,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaqD,EAAUC,IACvBjJ,EAAKub,yBAAyBnV,EAAQwB,KAAKd,UAAWkC,EAASlC,WAC/D,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4N,GAAgBvM,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASImV,OAAAA,CAAQxS,GACJrD,EAAaqD,EAAUC,IAEvB,OAAe,IADHjJ,EAAKyb,yBAAyB7T,KAAKd,UAAWkC,EAASlC,UAE3E,GAGA,MAAM4U,GAA+D,oBAAzBnX,qBACtC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2b,2BAA2Bna,IAAQ,K,OAI9E,MAAMoa,EAEF,aAAOvT,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqT,EAAgBpT,WAG1C,OAFA5G,EAAIkF,UAAYtF,EAChBka,GAA4BlX,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAClDA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4U,GAA4BjX,WAAWmD,MAChCpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2b,2BAA2Bna,EACxC,CAMIqO,UAAAA,CAAW+D,EAAYR,GACnB,IACI,MAAMhN,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAK6b,2BAA2BzV,EAAQwB,KAAKd,UAAWL,EAAMG,EAAMqF,EAAM8D,GAC1E,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO8U,EAAMzT,OAAOtB,EAChC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWiR,GACd,IACI,MAAM/U,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2Y,EAAQnb,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK+b,2BAA2B3V,EAAQK,EAAMG,GAC9C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4U,EAAgBvT,OAAOtB,EAC1C,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKgc,yBAAyB5V,EAAQwB,KAAKd,WAC3C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI0S,YAAAA,GACI,MAAMrb,EAAMZ,EAAKkc,6BAA6BtU,KAAKd,WACnD,OAAO2O,OAAOC,QAAQ,GAAI9U,EAClC,CAOIub,KAAAA,GACI,IAAI7S,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKoc,sBAAsBhW,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAaI8S,kBAAAA,CAAmBzT,EAAagL,EAAYR,GACxC,IAAIkJ,EACAC,EACJ,IACI,MAAMnW,EAASpG,EAAKqG,iCAAiC,IACrDV,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOjE,EAAkBoR,EAAY5T,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACPoK,EAAOzJ,EAAkB4Q,EAAapT,EAAK0G,kBAAmB1G,EAAK2G,oBACnEoJ,EAAOlO,EACb7B,EAAKwc,mCAAmCpW,EAAQwB,KAAKd,UAAW8B,EAAY9B,UAAWL,EAAMG,EAAMqF,EAAM8D,GACzG,IAAIhJ,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpC2O,EAAOhO,EACPoP,EAAOnP,EACX,GAAIyV,EAEA,MADA1H,EAAO,EAAGoB,EAAO,EACXxV,EAAW6U,GAIrB,OAFA8G,EAAcvH,EACdwH,EAAcpG,EACP5U,EAAmBwT,EAAMoB,EAC5C,CAAU,QACEnW,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB6S,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMG,GAAyD,oBAAzBnY,qBAChC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2c,qBAAqBnb,IAAQ,K,OAIxE,MAAMob,EAEF,aAAOvU,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqU,EAAUpU,WAGpC,OAFA5G,EAAIkF,UAAYtF,EAChBkb,GAAsBlY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC5CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4V,GAAsBjY,WAAWmD,MAC1BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2c,qBAAqBnb,EAClC,CAWI,WAAO0P,CAAKtI,EAAaxE,GACrBuB,EAAaiD,EAAaC,IAC1B,MAAMpC,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EACPjB,EAAMZ,EAAKmR,gBAAgBvI,EAAY9B,UAAWL,EAAMG,GAC9D,OAAOgW,EAAUvU,OAAOzH,EAChC,CAWI8I,MAAAA,CAAOvK,EAASiF,GACZuB,EAAaxG,EAAS8R,GACtB,MAAMxK,EAAOX,EAAkB1B,EAASpE,EAAK0G,mBACvCE,EAAO/E,EAEb,OAAe,IADH7B,EAAK6c,iBAAiBjV,KAAKd,UAAW3H,EAAQ2H,UAAWL,EAAMG,EAEnF,CASI,kBAAOuC,CAAYQ,GACf,MAAMlD,EAAOjE,EAAkBmH,EAAW3J,EAAK0G,kBAAmB1G,EAAK2G,oBACjEC,EAAO/E,EACPjB,EAAMZ,EAAK8c,sBAAsBrW,EAAMG,GAC7C,OAAOgW,EAAUvU,OAAOzH,EAChC,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK+c,oBAAoB3W,EAAQwB,KAAKd,WACtC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMyT,GAA2D,oBAAzBzY,qBAClC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKid,uBAAuBzb,IAAQ,K,OAO1E,MAAM0b,EAEF,aAAO7U,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO2U,EAAY1U,WAGtC,OAFA5G,EAAIkF,UAAYtF,EAChBwb,GAAwBxY,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC9CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBkW,GAAwBvY,WAAWmD,MAC5BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKid,uBAAuBzb,EACpC,CASI,iBAAO0I,CAAWiT,GACd,IACI,MAAM/W,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkB2a,EAAand,EAAK0G,kBAAmB1G,EAAK2G,oBACnEC,EAAO/E,EACb7B,EAAKod,uBAAuBhX,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAOkW,EAAY7U,OAAOtB,EACtC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAQIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKqd,qBAAqBjX,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAWI+T,aAAAA,GACI,IAAIhU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKud,0BAA0BnX,EAAQwB,KAAKd,WAC5C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIiU,eAAAA,GACI,IAAIlU,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyd,4BAA4BrX,EAAQwB,KAAKd,WAC9C,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMmU,GAA4D,oBAAzBnZ,qBACnC,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAK2d,wBAAwBnc,IAAQ,K,OAI3E,MAAMoc,EAEF,aAAOvV,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAOqV,EAAapV,WAGvC,OAFA5G,EAAIkF,UAAYtF,EAChBkc,GAAyBlZ,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC/CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjB4W,GAAyBjZ,WAAWmD,MAC7BpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAK2d,wBAAwBnc,EACrC,CAOI,yBAAOqc,GACH,MAAMjd,EAAMZ,EAAK8d,kCACjB,OAAOF,EAAavV,OAAOzH,EACnC,CAOI,4BAAOmd,GACH,MAAMnd,EAAMZ,EAAKge,qCACjB,OAAOJ,EAAavV,OAAOzH,EACnC,CAOI,gCAAOqd,GACH,MAAMrd,EAAMZ,EAAKke,yCACjB,OAAON,EAAavV,OAAOzH,EACnC,CAOI,yBAAOud,GACH,MAAMvd,EAAMZ,EAAKoe,kCACjB,OAAOR,EAAavV,OAAOzH,EACnC,CAOI,wBAAOyd,GACH,MAAMzd,EAAMZ,EAAKse,iCACjB,OAAOV,EAAavV,OAAOzH,EACnC,CAOI,wBAAO2d,GACH,MAAM3d,EAAMZ,EAAKwe,iCACjB,OAAOZ,EAAavV,OAAOzH,EACnC,CAOI,mBAAO6d,GACH,MAAM7d,EAAMZ,EAAK0e,4BACjB,OAAOd,EAAavV,OAAOzH,EACnC,CAOI,gCAAO+d,GACH,MAAM/d,EAAMZ,EAAK4e,yCACjB,OAAOhB,EAAavV,OAAOzH,EACnC,CAOI,oBAAOie,GACH,MAAMje,EAAMZ,EAAK8e,6BACjB,OAAOlB,EAAavV,OAAOzH,EACnC,CAOI,8BAAOme,GACH,MAAMne,EAAMZ,EAAKgf,uCACjB,OAAOpB,EAAavV,OAAOzH,EACnC,CAOI,sCAAOqe,GACH,MAAMre,EAAMZ,EAAKkf,+CACjB,OAAOtB,EAAavV,OAAOzH,EACnC,CAOI,6BAAOue,GACH,MAAMve,EAAMZ,EAAKof,sCACjB,OAAOxB,EAAavV,OAAOzH,EACnC,CAOI,qCAAOye,GACH,MAAMze,EAAMZ,EAAKsf,8CACjB,OAAO1B,EAAavV,OAAOzH,EACnC,CAOI,sCAAO2e,GACH,MAAM3e,EAAMZ,EAAKwf,+CACjB,OAAO5B,EAAavV,OAAOzH,EACnC,CAOI,2BAAO6e,GACH,MAAM7e,EAAMZ,EAAK0f,oCACjB,OAAO9B,EAAavV,OAAOzH,EACnC,CAOI+e,oBAAAA,GAEI,OAAe,IADH3f,EAAK4f,kCAAkChY,KAAKd,UAEhE,CAOI+Y,uBAAAA,GAEI,OAAe,IADH7f,EAAK8f,qCAAqClY,KAAKd,UAEnE,CAOIiZ,2BAAAA,GAEI,OAAe,IADH/f,EAAKggB,yCAAyCpY,KAAKd,UAEvE,CAOImZ,oBAAAA,GAEI,OAAe,IADHjgB,EAAKkgB,kCAAkCtY,KAAKd,UAEhE,CAOIqZ,mBAAAA,GAEI,OAAe,IADHngB,EAAKogB,iCAAiCxY,KAAKd,UAE/D,CAOIuZ,mBAAAA,GAEI,OAAe,IADHrgB,EAAKsgB,iCAAiC1Y,KAAKd,UAE/D,CAOIyZ,cAAAA,GAEI,OAAe,IADHvgB,EAAKwgB,4BAA4B5Y,KAAKd,UAE1D,CAOI2Z,2BAAAA,GAEI,OAAe,IADHzgB,EAAK0gB,yCAAyC9Y,KAAKd,UAEvE,CAOI6Z,eAAAA,GAEI,OAAe,IADH3gB,EAAK4gB,6BAA6BhZ,KAAKd,UAE3D,CAOI+Z,yBAAAA,GAEI,OAAe,IADH7gB,EAAK8gB,uCAAuClZ,KAAKd,UAErE,CAOIia,iCAAAA,GAEI,OAAe,IADH/gB,EAAKghB,+CAA+CpZ,KAAKd,UAE7E,CAOIma,wBAAAA,GAEI,OAAe,IADHjhB,EAAKkhB,sCAAsCtZ,KAAKd,UAEpE,CAOIqa,gCAAAA,GAEI,OAAe,IADHnhB,EAAKohB,8CAA8CxZ,KAAKd,UAE5E,CAOIua,iCAAAA,GAEI,OAAe,IADHrhB,EAAKshB,+CAA+C1Z,KAAKd,UAE7E,CAOIya,sBAAAA,GAEI,OAAe,IADHvhB,EAAKwhB,oCAAoC5Z,KAAKd,UAElE,CAOIqT,QAAAA,GACI,IAAI7Q,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKyhB,sBAAsBrb,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOI8Q,IAAAA,GACI,MAAMzZ,EAAMZ,EAAK0hB,kBAAkB9Z,KAAKd,WACxC,OAAO8W,EAAavV,OAAOzH,EACnC,CASI,gBAAO2Z,CAAUC,GACb,IACI,MAAMpU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOX,EAAkB0U,EAAOxa,EAAK0G,mBACrCE,EAAO/E,EACb7B,EAAK2hB,uBAAuBvb,EAAQK,EAAMG,GAC1C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CASI,iBAAO6D,CAAWwQ,GACd,IACI,MAAMtU,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBkY,EAAQ1a,EAAK0G,kBAAmB1G,EAAK2G,oBAC9DC,EAAO/E,EACb7B,EAAK4hB,wBAAwBxb,EAAQK,EAAMG,GAC3C,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAWqG,GAErB,OAAO4W,EAAavV,OAAOtB,EACvC,CAAU,QACE/G,EAAKqG,gCAAgC,GACjD,CACA,CAOIuU,OAAAA,GACI,IACI,MAAMxU,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK6hB,qBAAqBzb,EAAQwB,KAAKd,WACvC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GAExC,GADSjD,IAAkBiD,EAAS,EAAI,GAEpC,MAAMzF,EAAW6U,GAErB,IAAIsF,EAAK1T,EAAoBL,EAAIC,GAAItF,QAErC,OADA1B,EAAKyJ,gBAAgB1C,EAAS,EAALC,EAAQ,GAC1B8T,CACnB,CAAU,QACE9a,EAAKqG,gCAAgC,GACjD,CACA,CAOIvC,QAAAA,GACI,IAAIwF,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAK8hB,sBAAsB1b,EAAQwB,KAAKd,WACxC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,GAGA,MAAMwY,GAAuD,oBAAzBxd,qBAC9B,CAAEC,SAAUA,OAAUC,WAAYA,QAClC,IAAIF,sBAAqB/C,GAAOxB,EAAKgiB,mBAAmBxgB,IAAQ,K,OAGtE,MAAMygB,EAEF,aAAO5Z,CAAO7G,GACVA,KAAc,EACd,MAAMI,EAAM0G,OAAOC,OAAO0Z,EAAQzZ,WAGlC,OAFA5G,EAAIkF,UAAYtF,EAChBugB,GAAoBvd,SAAS5C,EAAKA,EAAIkF,UAAWlF,GAC1CA,CACf,CAEI6G,kBAAAA,GACI,MAAMjH,EAAMoG,KAAKd,UAGjB,OAFAc,KAAKd,UAAY,EACjBib,GAAoBtd,WAAWmD,MACxBpG,CACf,CAEIkH,IAAAA,GACI,MAAMlH,EAAMoG,KAAKa,qBACjBzI,EAAKgiB,mBAAmBxgB,EAChC,CASI,uBAAOmH,CAAiBC,GACpBjD,EAAaiD,EAAaC,IAC1B,MAAMjI,EAAMZ,EAAK8Q,uBAAuBlI,EAAY9B,WACpD,OAAOmb,EAAQ5Z,OAAOzH,EAC9B,CASI,kBAAOuI,CAAYH,GACf,MAAMvC,EAAOjE,EAAkBwG,EAAUhJ,EAAK0G,kBAAmB1G,EAAK2G,oBAChEC,EAAO/E,EACPjB,EAAMZ,EAAKkiB,oBAAoBzb,EAAMG,GAC3C,OAAOqb,EAAQ5Z,OAAOzH,EAC9B,CAOIyI,SAAAA,GACI,IAAIC,EACAC,EACJ,IACI,MAAMnD,EAASpG,EAAKqG,iCAAiC,IACrDrG,EAAKmiB,kBAAkB/b,EAAQwB,KAAKd,WACpC,IAAIC,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GAGxC,OAFAkD,EAAcvC,EACdwC,EAAcvC,EACPzF,EAAmBwF,EAAIC,EAC1C,CAAU,QACEhH,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgBH,EAAaC,EAAa,EAC3D,CACA,CAOIwH,UAAAA,GACI,MAAMnQ,EAAMZ,EAAKkJ,sBAAsBtB,KAAKd,WAC5C,OAAOmK,EAAQ5I,OAAOzH,EAC9B,CASI0a,OAAAA,CAAQ3J,GACJ,IAAIyQ,EACAC,EACJ,IACI,MAAMjc,EAASpG,EAAKqG,iCAAiC,IAC/CI,EAAOjE,EAAkBmP,EAAY3R,EAAK0G,kBAAmB1G,EAAK2G,oBAClEC,EAAO/E,EACb7B,EAAKsiB,gBAAgBlc,EAAQwB,KAAKd,UAAWL,EAAMG,GACnD,IAAIG,EAAK5D,IAAkBiD,EAAS,EAAI,GACpCY,EAAK7D,IAAkBiD,EAAS,EAAI,GACpCoP,EAAKrS,IAAkBiD,EAAS,EAAI,GACpCqW,EAAKtZ,IAAkBiD,EAAS,EAAI,GACpCyO,EAAO9N,EACP+N,EAAO9N,EACX,GAAIyV,EAEA,MADA5H,EAAO,EAAGC,EAAO,EACXnU,EAAW6U,GAIrB,OAFA4M,EAAcvN,EACdwN,EAAcvN,EACPvT,EAAmBsT,EAAMC,EAC5C,CAAU,QACE9U,EAAKqG,gCAAgC,IACrCrG,EAAKyJ,gBAAgB2Y,EAAaC,EAAa,EAC3D,CACA,GAGAE,eAAeC,EAAWvjB,EAAQuV,GAC9B,GAAwB,mBAAbiO,UAA2BxjB,aAAkBwjB,SAAU,CAC9D,GAAgD,mBAArCC,YAAYC,qBACnB,IACI,aAAaD,YAAYC,qBAAqB1jB,EAAQuV,EAEtE,CAAc,MAAO3M,GACL,GAA0C,oBAAtC5I,EAAO2jB,QAAQhe,IAAI,gBAInB,MAAMiD,EAHNgb,QAAQC,KAAK,oMAAqMjb,EAKtO,CAGQ,MAAM2S,QAAcvb,EAAO8jB,cAC3B,aAAaL,YAAYM,YAAYxI,EAAOhG,EAEpD,CAAW,CACH,MAAM5O,QAAiB8c,YAAYM,YAAY/jB,EAAQuV,GAEvD,OAAI5O,aAAoB8c,YAAYO,SACzB,CAAErd,WAAU3G,UAGZ2G,CAEnB,CACA,CAEA,SAASsd,IACL,MAAM1O,EAAU,CAChBA,IAAc,CAAC,GAgcf,OA/bAA,EAAQ2O,IAAIC,2BAA6B,SAASne,GAC9CtE,EAAWsE,EACnB,EACIuP,EAAQ2O,IAAIE,2BAA6B,WAAa,OAAO3b,GAAY,WAErE,OAAO/F,EADK,IAAI2hB,eAExB,GAAOC,UAAU,EACb/O,EAAQ2O,IAAIK,wCAA0C,WAAa,OAAO9b,GAAY,SAAUzC,EAAMC,EAAMO,GACxGpF,EAAU4E,GAAMwe,iBAAiBliB,EAAmB2D,EAAMO,GAClE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIO,4BAA8B,WAAa,OAAOhc,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,EAAMC,GAC9GvjB,EAAU4E,GAAM4e,KAAKtiB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GAAgB,IAATC,EAC7F,GAAOL,UAAU,EACb/O,EAAQ2O,IAAIW,4BAA8B,WAAa,OAAOpc,GAAY,SAAUzC,GAChF5E,EAAU4E,GAAM8e,MACxB,GAAOR,UAAU,EACb/O,EAAQ2O,IAAIa,gCAAkC,WAAa,OAAOtc,GAAY,SAAUzC,GAEpF,OAAOtD,EADKtB,EAAU4E,GAAMgf,SAEpC,GAAOV,UAAU,EACb/O,EAAQ2O,IAAIe,8BAAgC,WAAa,OAAOxc,GAAY,SAAUzC,GAElF,OADY5E,EAAU4E,GAAMkf,MAEpC,GAAOZ,UAAU,EACb/O,EAAQ2O,IAAIiB,2BAA6B,WAErC,OAAOziB,EADK,IAAI2G,OAExB,EACIkM,EAAQ2O,IAAIkB,sBAAwB,SAASpf,EAAMC,GAE/C,OAAOvD,EADKJ,EAAmB0D,EAAMC,GAE7C,EACIsP,EAAQ2O,IAAImB,2BAA6B,WAAa,OAAO5c,GAAY,SAAUzC,EAAMC,EAAMO,GAE3F,OADY8e,QAAQliB,IAAIhC,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAE5E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIqB,2BAA6B,WAAa,OAAO9c,GAAY,WAErE,OAAO/F,EADK,IAAI8iB,QAExB,GAAOlB,UAAU,EACb/O,EAAQ2O,IAAIuB,4BAA8B,SAASzf,GAE/C,OAAOtD,EADKtB,EAAU4E,GAE9B,EACIuP,EAAQ2O,IAAIwB,2BAA6B,WAAa,OAAOjd,GAAY,WAErE,OAAO/F,EADK,IAAIijB,gBAExB,GAAOrB,UAAU,EACb/O,EAAQ2O,IAAI0B,8BAAgC,SAAS5f,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM6f,OAEpC,EACItQ,EAAQ2O,IAAI4B,8BAAgC,WAAa,OAAOrd,GAAY,SAAUzC,EAAMC,EAAMO,EAAMuC,EAAM2b,GAC1GtjB,EAAU4E,GAAM+f,OAAOzjB,EAAmB2D,EAAMO,GAAOlE,EAAmByG,EAAM2b,GACxF,GAAOJ,UAAU,EACb/O,EAAQ2O,IAAI8B,2CAA6C,SAAShgB,GAC9D,IAAIigB,EACJ,IACIA,EAAS7kB,EAAU4E,aAAiBwd,QAChD,CAAU,MAAOte,GACL+gB,GAAS,CACrB,CAEQ,OADYA,CAEpB,EACI1Q,EAAQ2O,IAAIgC,8BAAgC,SAASlgB,GAEjD,OADY5E,EAAU4E,GAAMkf,MAEpC,EACI3P,EAAQ2O,IAAIiC,2BAA6B,SAASngB,EAAMC,GACpD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMlG,IACQgB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIkC,+BAAiC,SAASpgB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAM2d,QAEpC,EACIpO,EAAQ2O,IAAImC,gCAAkC,WAE1C,OAAO3jB,EADK4jB,OAAOC,SAE3B,EACIhR,EAAQ2O,IAAIsC,2BAA6B,WAAa,OAAO/d,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK4iB,QAAQ3f,IAAIvE,EAAU4E,GAAO5E,EAAU6E,IAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIuC,uBAAyB,SAASzgB,GAE1C,MADwC,mBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIwC,4BAA8B,WAAa,OAAOje,GAAY,SAAUzC,EAAMC,GAEtF,OAAOvD,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,IAEnD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyC,qBAAuB,SAAS3gB,GACxC,MAAM3B,EAAMjD,EAAU4E,GAEtB,MAD4B,iBAAT3B,GAA6B,OAARA,CAEhD,EACIkR,EAAQ2O,IAAI0C,4BAA8B,SAAS5gB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAM6gB,KAEpC,EACItR,EAAQ2O,IAAI4C,4BAA8B,WAAa,OAAOre,GAAY,SAAUzC,GAEhF,OAAOtD,EADKtB,EAAU4E,GAAM6gB,OAEpC,GAAOvC,UAAU,EACb/O,EAAQ2O,IAAI6C,4BAA8B,SAAS/gB,GAE/C,OADY5E,EAAU4E,GAAMghB,IAEpC,EACIzR,EAAQ2O,IAAI+C,6BAA+B,SAASjhB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAIiD,6BAA+B,SAASnhB,GAChD5E,EAAU4E,GAAMohB,OACxB,EACI7R,EAAQ2O,IAAImD,iCAAmC,WAAa,OAAO5e,GAAY,SAAUzC,GAErF,OAAOtD,EADKsC,KAAKC,UAAU7D,EAAU4E,IAE7C,GAAOse,UAAU,EACb/O,EAAQ2O,IAAIoD,sBAAwB,SAASthB,EAAMC,GAC/C,MAAMtD,EAAMvB,EAAU6E,GAChBtE,EAAsB,iBAATgB,EAAoBA,OAAMxB,EAC7C,IAAI6L,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIqD,2BAA6B,SAASvhB,EAAMC,GACpD2d,QAAQ4D,IAAIllB,EAAmB0D,EAAMC,GAC7C,EACIsP,EAAQ2O,IAAIuD,2BAA6B,SAASzhB,GAE9C,OAAOtD,EADK8T,OAAOC,QAAQ,GAAIzQ,GAEvC,EACIuP,EAAQ2O,IAAIwD,4BAA8B,WAAa,OAAOjf,GAAY,SAAUzC,EAAMC,EAAMO,GAE5F,OAAO9D,EADKtB,EAAU4E,GAAMlB,KAAK1D,EAAU6E,GAAO7E,EAAUoF,IAEpE,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAIyD,sBAAwB,SAAS3hB,GAEzC,OAAOtD,EADKklB,GAAYxe,OAAOpD,GAEvC,EACIuP,EAAQ2O,IAAI2D,kBAAoB,SAAS7hB,GAErC,OAAOtD,EADKkJ,GAAQxC,OAAOpD,GAEnC,EACIuP,EAAQ2O,IAAI4D,kBAAoB,WAE5B,OAAOplB,EADKqlB,EAAWC,uBAE/B,EACIzS,EAAQ2O,IAAI+D,kBAAoB,WAE5B,OAAOvlB,EADK3B,EAAKd,OAEzB,EACIsV,EAAQ2O,IAAIgE,mCAAqC,SAASliB,EAAMC,EAAMO,EAAMuC,GAExE,OAAOrG,EADK5C,EAAYsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,GAAOuC,IAAS,GAE5F,EACIwM,EAAQ2O,IAAIiE,4BAA8B,SAASniB,GAE/C,OAAOtD,EADK0lB,EAAkBhf,OAAOpD,GAE7C,EACIuP,EAAQ2O,IAAImE,qCAAuC,SAASriB,GAExD,OAAOtD,EADK,IAAIzB,MAAM+E,IAAS,GAEvC,EACIuP,EAAQ2O,IAAIoE,2BAA6B,SAAStiB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAMC,IAAS,GAAKvE,EAAW8E,EACjD,EACI+O,EAAQ2O,IAAIqE,mBAAqB,SAASviB,GACtC,MAAMrD,EAAMjB,EAAWsE,GAAMM,SAC7B,GAAiB,GAAb3D,EAAIwD,MAEJ,OADAxD,EAAIkD,EAAI,GACD,EAGX,OADY,CAEpB,EACI0P,EAAQ2O,IAAIsE,2BAA6B,WAErC,OAAO9lB,EADK,IAAIzB,MAExB,EACIsU,EAAQ2O,IAAIuE,4BAA8B,SAASziB,EAAMC,GAErD,OADY7E,EAAU4E,GAAM1E,KAAKF,EAAU6E,GAEnD,EACIsP,EAAQ2O,IAAIwE,mCAAqC,WAAa,OAAOjgB,GAAY,SAAUzC,GAEvF,OAAOtD,EADKtB,EAAU4E,GAAM8d,cAEpC,GAAOQ,UAAU,EACb/O,EAAQ2O,IAAIyE,2BAA6B,SAAS3iB,GAE9C,OAAOtD,EADK,IAAIL,WAAWjB,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI0E,8BAAgC,SAAS5iB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI2E,2BAA6B,SAAS7iB,EAAMC,GACpD,IACI,IAAI6iB,EAAS,CAACjjB,EAAGG,EAAMF,EAAGG,GAU1B,MAAMtE,EAAM,IAAIxB,SATN4oB,CAAC/iB,EAAMC,KACb,MAAMJ,EAAIijB,EAAOjjB,EACjBijB,EAAOjjB,EAAI,EACX,IACI,OAAOiD,EAAkBjD,EAAGijB,EAAOhjB,EAAGE,EAAMC,EAChE,CAAkB,QACE6iB,EAAOjjB,EAAIA,CAC/B,KAGY,OAAOnD,EAAcf,EACjC,CAAU,QACEmnB,EAAOjjB,EAAIijB,EAAOhjB,EAAI,CAClC,CACA,EACIyP,EAAQ2O,IAAI8E,sBAAwB,SAAShjB,GAEzC,OAAOtD,EADKsD,EAEpB,EACIuP,EAAQ2O,IAAI+E,2BAA6B,WAErC,OAAOvmB,EADK,IAAIT,MAExB,EACIsT,EAAQ2O,IAAIgF,6BAA+B,SAASljB,EAAMC,GACtD,MACM+G,EAAOzJ,EADDnC,EAAU6E,GAAMb,MACQrE,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIiF,6BAA+B,SAASnjB,EAAMC,GACtD,IAAImjB,EACAC,EACJ,IACID,EAAcpjB,EACdqjB,EAAcpjB,EACd2d,QAAQ0F,MAAMhnB,EAAmB0D,EAAMC,GACnD,CAAU,QACElF,EAAKyJ,gBAAgB4e,EAAaC,EAAa,EAC3D,CACA,EACI9T,EAAQ2O,IAAIqF,8BAAgC,SAASvjB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAM5D,OAEpC,EACImT,EAAQ2O,IAAIsF,kDAAoD,SAASxjB,EAAMC,EAAMO,GAEjF,OAAO9D,EADK,IAAIL,WAAWjB,EAAU4E,GAAOC,IAAS,EAAGO,IAAS,GAEzE,EACI+O,EAAQ2O,IAAIuF,sCAAwC,WAAa,OAAOhhB,GAAY,SAAUzC,EAAMC,GAChG7E,EAAU4E,GAAM0jB,eAAehoB,EAAWuE,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIyF,gCAAkC,SAAS3jB,EAAMC,EAAMO,GAE/D,OAAO9D,EADKtB,EAAU4E,GAAMtC,SAASuC,IAAS,EAAGO,IAAS,GAElE,EACI+O,EAAQ2O,IAAI0F,uCAAyC,WAAa,OAAOnhB,GAAY,SAAUzC,EAAMC,GACjG7E,EAAU4E,GAAM6jB,gBAAgBzoB,EAAU6E,GAClD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI4F,2BAA6B,SAAS9jB,EAAMC,EAAMO,GAC1DpF,EAAU4E,GAAM5C,IAAIhC,EAAU6E,GAAOO,IAAS,EACtD,EACI+O,EAAQ2O,IAAI6F,8BAAgC,SAAS/jB,GAEjD,OAAOtD,EADKtB,EAAU4E,GAAMgkB,OAEpC,EACIzU,EAAQ2O,IAAI+F,+BAAiC,SAASjkB,GAElD,OAAOtD,EADKtB,EAAU4E,GAAMkkB,QAEpC,EACI3U,EAAQ2O,IAAIiG,gCAAkC,SAASnkB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAMokB,SAEpC,EACI7U,EAAQ2O,IAAImG,4BAA8B,SAASrkB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMskB,KAEpC,EACI/U,EAAQ2O,IAAIqG,qBAAuB,SAASvkB,GAExC,MADwC,iBAArB5E,EAAU4E,EAErC,EACIuP,EAAQ2O,IAAIsG,+BAAiC,WAAa,OAAO/hB,GAAY,WAEzE,OAAO/F,EADK1C,OAAOyqB,QAE3B,GAAOnG,UAAU,EACb/O,EAAQ2O,IAAIwG,gCAAkC,SAAS1kB,GAEnD,OAAOtD,EADKtB,EAAU4E,GAAM2kB,SAEpC,EACIpV,EAAQ2O,IAAI0G,qCAAuC,SAAS5kB,GAExD,OAAOtD,EADK,IAAIL,WAAW2D,IAAS,GAE5C,EACIuP,EAAQ2O,IAAI2G,8BAAgC,SAAS7kB,GAEjD,OADY5E,EAAU4E,GAAMxE,MAEpC,EACI+T,EAAQ2O,IAAI4G,2BAA6B,SAAS9kB,EAAMC,GAEpD,OAAOvD,EADKtB,EAAU4E,GAAMC,IAAS,GAE7C,EACIsP,EAAQ2O,IAAI6G,4BAA8B,WAAa,OAAOtiB,GAAY,WAEtE,OAAO/F,EADKsoB,KAAKA,KAEzB,GAAO1G,UAAU,EACb/O,EAAQ2O,IAAI+G,8BAAgC,WAAa,OAAOxiB,GAAY,WAExE,OAAO/F,EADKwoB,OAAOA,OAE3B,GAAO5G,UAAU,EACb/O,EAAQ2O,IAAIiH,kCAAoC,WAAa,OAAO1iB,GAAY,WAE5E,OAAO/F,EADK0oB,WAAWA,WAE/B,GAAO9G,UAAU,EACb/O,EAAQ2O,IAAImH,8BAAgC,WAAa,OAAO5iB,GAAY,WAExE,OAAO/F,EADK4oB,OAAOA,OAE3B,GAAOhH,UAAU,EACb/O,EAAQ2O,IAAIqH,wBAA0B,SAASvlB,GAE3C,YADgC7E,IAApBC,EAAU4E,EAE9B,EACIuP,EAAQ2O,IAAIsH,iCAAmC,SAASxlB,EAAMC,GAE1D,OAAOvD,EADK,IAAI+oB,SAASnpB,EAAmB0D,EAAMC,IAE1D,EACIsP,EAAQ2O,IAAIwH,2BAA6B,WAAa,OAAOjjB,GAAY,SAAUzC,EAAMC,GAErF,OADYqf,QAAQqG,IAAIvqB,EAAU4E,GAAO5E,EAAU6E,GAE3D,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAI0H,6BAA+B,SAAS5lB,GAEhD,OAAOtD,EADKmpB,MAAMzqB,EAAU4E,IAEpC,EACIuP,EAAQ2O,IAAI4H,6BAA+B,SAAS9lB,EAAMC,GAEtD,OAAOvD,EADKtB,EAAU4E,GAAM6lB,MAAMzqB,EAAU6E,IAEpD,EACIsP,EAAQ2O,IAAI6H,wBAA0B,SAAS/lB,EAAMC,GACjD,MACM+G,EAAOzJ,EADDa,EAAYhD,EAAU6E,IACElF,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAI8H,iBAAmB,SAAShmB,EAAMC,GAC1C,MAAM,IAAIhE,MAAMK,EAAmB0D,EAAMC,GACjD,EACIsP,EAAQ2O,IAAI+H,mBAAqB,SAASjmB,GACtC,MAAMtE,EAAWsE,EACzB,EACIuP,EAAQ2O,IAAIgI,4BAA8B,SAASlmB,EAAMC,EAAMO,GAE3D,OAAO9D,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,GAAO7E,EAAUoF,IAEpE,EACI+O,EAAQ2O,IAAIkI,4BAA8B,SAASpmB,EAAMC,GAErD,OAAOvD,EADKtB,EAAU4E,GAAMmmB,KAAK/qB,EAAU6E,IAEnD,EACIsP,EAAQ2O,IAAImI,sCAAwC,SAASrmB,GACzDsmB,eAAelrB,EAAU4E,GACjC,EACIuP,EAAQ2O,IAAIqI,sCAAwC,SAASvmB,GAEzD,OAAOtD,EADKtB,EAAU4E,GAAMsmB,eAEpC,EACI/W,EAAQ2O,IAAIsI,+BAAiC,SAASxmB,GAElD,OAAOtD,EADKvC,QAAQC,QAAQgB,EAAU4E,IAE9C,EACIuP,EAAQ2O,IAAIuI,iCAAmC,WAE3C,OAAO/pB,EADKgqB,QAAQC,UAE5B,EACIpX,EAAQ2O,IAAI0I,2BAA6B,SAAS5mB,GAE9C,OAAOtD,EADK,IAAIyB,WAAW/C,EAAU4E,IAE7C,EACIuP,EAAQ2O,IAAI2I,iCAAmC,SAAS7mB,EAAMC,EAAMO,GAEhE,OAAO9D,EADKgqB,QAAQC,UAAUvrB,EAAU4E,GAAOC,EAAMO,GAE7D,EACI+O,EAAQ2O,IAAI4I,6BAA+B,SAAS9mB,GAEhD,OADY5E,EAAU4E,GAAMsd,KAEpC,EACI/N,EAAQ2O,IAAI6I,6BAA+B,SAAS/mB,GAEhD,OAAOtD,EADKtB,EAAU4E,GAAMkhB,MAEpC,EACI3R,EAAQ2O,IAAI8I,iCAAmC,SAAShnB,GACpD,MAOMgH,EAAOzJ,EAPD,+BAAiC0pB,mBAAoB,6OAO7BlsB,EAAK0G,kBAAmB1G,EAAK2G,oBAC3DoJ,EAAOlO,EACbsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,EACIuI,EAAQ2O,IAAIgJ,2BAA6B,WAAa,OAAOzkB,GAAY,SAAUzC,EAAMC,GAErF,OAAOvD,EADK,IAAIpC,OAAOgC,EAAmB0D,EAAMC,IAExD,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIiJ,oCAAsC,SAASnnB,EAAMC,GAC7D7E,EAAU4E,GAAMonB,UAAYhsB,EAAU6E,EAC9C,EACIsP,EAAQ2O,IAAImJ,0BAA4B,SAASrnB,EAAMC,EAAMO,GAEzD,OAAO9D,EADKzB,MAAMqsB,GAAGlsB,EAAU4E,GAAO5E,EAAU6E,GAAO7E,EAAUoF,IAEzE,EACI+O,EAAQ2O,IAAIqJ,mCAAqC,WAAa,OAAO9kB,GAAY,SAAUzC,EAAMC,GAC7F7E,EAAU4E,GAAMlF,YAAYM,EAAU6E,GAC9C,GAAOqe,UAAU,EACb/O,EAAQ2O,IAAIsJ,4BAA8B,SAASxnB,GAE/C,OAAOtD,EADKtB,EAAU4E,GAAMynB,KAEpC,EACIlY,EAAQ2O,IAAIwJ,yCAA2C,WAAa,OAAOjlB,GAAY,SAAUzC,EAAMC,EAAMO,GAEzG,OAAO9D,EADK,IAAIirB,QAAQrrB,EAAmB0D,EAAMC,GAAO7E,EAAUoF,IAE1E,GAAO8d,UAAU,EACb/O,EAAQ2O,IAAI0J,oCAAsC,WAAa,OAAOnlB,GAAY,SAAUzC,EAAMC,GAC9F,MAAMtE,EAAMP,EAAU6E,GAAM4nB,aAC5B,IAAI7gB,EAAOjJ,EAAWpC,GAAO,EAAI4B,EAAkB5B,EAAKZ,EAAK0G,kBAAmB1G,EAAK2G,oBACjFoJ,EAAOlO,EACXsB,IAAkB8B,EAAO,EAAI,GAAK8K,EAClC5M,IAAkB8B,EAAO,EAAI,GAAKgH,CAC1C,GAAOsX,UAAU,EACb/O,EAAQ2O,IAAI4J,+BAAiC,SAAS9nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EACIgP,EAAQ2O,IAAI6J,+BAAiC,SAAS/nB,EAAMC,EAAMO,GAE9D,OAAO9D,EADKqD,EAAeC,EAAMC,EAAM,IAAKM,GAEpD,EAEWgP,CACX,CAEA,SAASyY,EAAkBzY,EAAS0Y,GAChC1Y,EAAQ2O,IAAIjkB,OAASguB,GAAgB,IAAIxK,YAAYyK,OAAO,CAACC,QAAQ,GAAGC,QAAQ,MAAMC,QAAO,GACjG,CAEA,SAASC,EAAoB3nB,EAAU3G,GAQnC,OAPAe,EAAO4F,EAAS4nB,QAChBxG,EAAWC,uBAAyBhoB,EACpCgI,EAAwB,KACxB/D,EAAqB,KACrB/B,EAAqB,KAErBnB,EAAKytB,mBACEztB,CACX,CAEA,SAAS0tB,EAASzuB,EAAQiuB,GACtB,QAAa9sB,IAATJ,EAAoB,OAAOA,EAE/B,MAAMwU,EAAU0O,IAEhB+J,EAAkBzY,EAAS0Y,GAErBjuB,aAAkByjB,YAAYiL,SAChC1uB,EAAS,IAAIyjB,YAAYiL,OAAO1uB,IAKpC,OAAOsuB,EAFU,IAAI7K,YAAYO,SAAShkB,EAAQuV,GAEbvV,EACzC,CAEAsjB,eAAeyE,EAAW4G,EAAOV,GAC7B,QAAa9sB,IAATJ,EAAoB,OAAOA,EAG/B,MAAMwU,EAAU0O,KAEK,iBAAV0K,GAA0C,mBAAZhB,SAA0BgB,aAAiBhB,SAA4B,mBAARiB,KAAsBD,aAAiBC,OAC3ID,EAAQ9C,MAAM8C,IAGlBX,EAAkBzY,EAAS0Y,GAE3B,MAAM,SAAEtnB,EAAQ,OAAE3G,SAAiBujB,QAAiBoL,EAAOpZ,GAE3D,OAAO+Y,EAAoB3nB,EAAU3G,EACzC,CAEA,IAAIuuB,EAAuBllB,OAAOwlB,OAAO,CACrCC,UAAW,KACX3lB,QAAS6I,EACTjH,UAAW1D,EACXgE,kBAAmB+c,EACnB5b,MAAOqQ,EACPjR,QAASA,GACT4B,SAAUuhB,GACVve,aAAcyF,GACd5E,WAAYzH,GACZkJ,qBAAsBR,GACtBgB,QAAS/L,GACTynB,eAAgBC,GAChB9V,WAAYpN,GACZkQ,iBAAkBiT,GAClBvS,gBAAiBhH,GACjBgI,UAAWhT,GACXsT,YAAa2J,GACbjJ,aAAcrX,GACd0b,QAAShZ,GACTmlB,QAASpH,EACT0G,SAAUA,EACVjmB,eAAgBF,EAChBF,eAAgBA,EAChBR,wBAAyBd,IAG7B,MAAMsoB,GAAY,wBC57Ib,MACD5mB,eAAgB6mB,GAAkB,QAClClmB,GAAO,UACP4B,GAAS,kBACTM,GAAiB,MACjBmB,GAAK,SACLgB,GAAQ,aACRgD,GAAY,QACZ8e,GAAO,WACPje,GAAU,qBACVyB,GAAoB,QACpBQ,GAAO,WACP6F,GAAU,iBACV8C,GAAgB,gBAChBU,GAAe,eACfqS,GAAc,UACdrR,GAAS,YACTM,GAAW,QACX+E,GAAO,aACPrE,GAAY,wBACZ/W,SD26IoB0b,OAAOiM,EAAM,CAAC,KACtB,IAAI,WAACC,EAAU,WAAEC,EAAU,eAAEC,GAAkBH,EAE3CI,EAAaP,GAiBjB,OAfkB,MAAdK,IACAE,EAAaF,EAAa,YAAY7qB,KAAK+qB,GAAY,IAGzC,MAAdH,IACAG,EAAaH,EAAWG,IAGN,MAAlBD,QACMA,EAAe3H,EAAY4H,SAG3B5H,EAAW4H,GAGdpB,CAAO,EC97IpBqB,CAAK,CACXJ,WAAYA,IACD,IAAIZ,IAAI,eAIvBtL,eAAe9a,EAAeqnB,GACX,MAAXA,IACAA,EAAUC,UAAUC,qBAGxBnM,QAAQoM,KAAM,YAAWH,mBAEnBR,GAAmB,IAAIT,IAAI,aAA+BiB,EACpE,C","sources":["webpack://aleo-website/wasm.js","webpack://aleo-website/../js/index.js"],"sourcesContent":["function spawnWorker(url, module, memory, address) {\n return new Promise((resolve) => {\n const worker = new Worker(url, {\n type: \"module\",\n });\n\n worker.addEventListener(\"message\", (event) => {\n // This is needed in Node to wait one extra tick, so that way\n // the Worker can fully initialize before we return.\n setTimeout(() => {\n resolve(worker);\n\n // When running in Node, this allows the process to exit\n // even though the Worker is still running.\n if (worker.unref) {\n worker.unref();\n }\n }, 0);\n }, {\n capture: true,\n once: true,\n });\n\n worker.postMessage({\n module,\n memory,\n address,\n });\n });\n }\n\nlet wasm;\n\nconst heap = new Array(128).fill(undefined);\n\nheap.push(undefined, null, true, false);\n\nfunction getObject(idx) { return heap[idx]; }\n\nlet heap_next = heap.length;\n\nfunction dropObject(idx) {\n if (idx < 132) return;\n heap[idx] = heap_next;\n heap_next = idx;\n}\n\nfunction takeObject(idx) {\n const ret = getObject(idx);\n dropObject(idx);\n return ret;\n}\n\nconst cachedTextDecoder = (typeof TextDecoder !== 'undefined' ? new TextDecoder('utf-8', { ignoreBOM: true, fatal: true }) : { decode: () => { throw Error('TextDecoder not available') } } );\n\nif (typeof TextDecoder !== 'undefined') { cachedTextDecoder.decode(); }\nlet cachedUint8Memory0 = null;\n\nfunction getUint8Memory0() {\n if (cachedUint8Memory0 === null || cachedUint8Memory0.buffer !== wasm.memory.buffer) {\n cachedUint8Memory0 = new Uint8Array(wasm.memory.buffer);\n }\n return cachedUint8Memory0;\n}\n\nfunction getStringFromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return cachedTextDecoder.decode(getUint8Memory0().slice(ptr, ptr + len));\n}\n\nfunction addHeapObject(obj) {\n if (heap_next === heap.length) heap.push(heap.length + 1);\n const idx = heap_next;\n heap_next = heap[idx];\n\n heap[idx] = obj;\n return idx;\n}\n\nlet WASM_VECTOR_LEN = 0;\n\nconst cachedTextEncoder = (typeof TextEncoder !== 'undefined' ? new TextEncoder('utf-8') : { encode: () => { throw Error('TextEncoder not available') } } );\n\nconst encodeString = function (arg, view) {\n const buf = cachedTextEncoder.encode(arg);\n view.set(buf);\n return {\n read: arg.length,\n written: buf.length\n };\n};\n\nfunction passStringToWasm0(arg, malloc, realloc) {\n\n if (realloc === undefined) {\n const buf = cachedTextEncoder.encode(arg);\n const ptr = malloc(buf.length, 1) >>> 0;\n getUint8Memory0().subarray(ptr, ptr + buf.length).set(buf);\n WASM_VECTOR_LEN = buf.length;\n return ptr;\n }\n\n let len = arg.length;\n let ptr = malloc(len, 1) >>> 0;\n\n const mem = getUint8Memory0();\n\n let offset = 0;\n\n for (; offset < len; offset++) {\n const code = arg.charCodeAt(offset);\n if (code > 0x7F) break;\n mem[ptr + offset] = code;\n }\n\n if (offset !== len) {\n if (offset !== 0) {\n arg = arg.slice(offset);\n }\n ptr = realloc(ptr, len, len = offset + arg.length * 3, 1) >>> 0;\n const view = getUint8Memory0().subarray(ptr + offset, ptr + len);\n const ret = encodeString(arg, view);\n\n offset += ret.written;\n ptr = realloc(ptr, len, offset, 1) >>> 0;\n }\n\n WASM_VECTOR_LEN = offset;\n return ptr;\n}\n\nfunction isLikeNone(x) {\n return x === undefined || x === null;\n}\n\nlet cachedInt32Memory0 = null;\n\nfunction getInt32Memory0() {\n if (cachedInt32Memory0 === null || cachedInt32Memory0.buffer !== wasm.memory.buffer) {\n cachedInt32Memory0 = new Int32Array(wasm.memory.buffer);\n }\n return cachedInt32Memory0;\n}\n\nfunction debugString(val) {\n // primitive types\n const type = typeof val;\n if (type == 'number' || type == 'boolean' || val == null) {\n return `${val}`;\n }\n if (type == 'string') {\n return `\"${val}\"`;\n }\n if (type == 'symbol') {\n const description = val.description;\n if (description == null) {\n return 'Symbol';\n } else {\n return `Symbol(${description})`;\n }\n }\n if (type == 'function') {\n const name = val.name;\n if (typeof name == 'string' && name.length > 0) {\n return `Function(${name})`;\n } else {\n return 'Function';\n }\n }\n // objects\n if (Array.isArray(val)) {\n const length = val.length;\n let debug = '[';\n if (length > 0) {\n debug += debugString(val[0]);\n }\n for(let i = 1; i < length; i++) {\n debug += ', ' + debugString(val[i]);\n }\n debug += ']';\n return debug;\n }\n // Test for built-in\n const builtInMatches = /\\[object ([^\\]]+)\\]/.exec(toString.call(val));\n let className;\n if (builtInMatches.length > 1) {\n className = builtInMatches[1];\n } else {\n // Failed to match the standard '[object ClassName]'\n return toString.call(val);\n }\n if (className == 'Object') {\n // we're a user defined class or Object\n // JSON.stringify avoids problems with cycles, and is generally much\n // easier than looping through ownProperties of `val`.\n try {\n return 'Object(' + JSON.stringify(val) + ')';\n } catch (_) {\n return 'Object';\n }\n }\n // errors\n if (val instanceof Error) {\n return `${val.name}: ${val.message}\\n${val.stack}`;\n }\n // TODO we could test for more things here, like `Set`s and `Map`s.\n return className;\n}\n\nconst CLOSURE_DTORS = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(state => {\n wasm.__wbindgen_export_3.get(state.dtor)(state.a, state.b);\n});\n\nfunction makeMutClosure(arg0, arg1, dtor, f) {\n const state = { a: arg0, b: arg1, cnt: 1, dtor };\n const real = (...args) => {\n // First up with a closure we increment the internal reference\n // count. This ensures that the Rust closure environment won't\n // be deallocated while we're invoking it.\n state.cnt++;\n const a = state.a;\n state.a = 0;\n try {\n return f(a, state.b, ...args);\n } finally {\n if (--state.cnt === 0) {\n wasm.__wbindgen_export_3.get(state.dtor)(a, state.b);\n CLOSURE_DTORS.unregister(state);\n } else {\n state.a = a;\n }\n }\n };\n real.original = state;\n CLOSURE_DTORS.register(real, state, state);\n return real;\n}\nfunction __wbg_adapter_34(arg0, arg1, arg2) {\n wasm._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3(arg0, arg1, addHeapObject(arg2));\n}\n\nfunction _assertClass(instance, klass) {\n if (!(instance instanceof klass)) {\n throw new Error(`expected instance of ${klass.name}`);\n }\n return instance.ptr;\n}\n\nfunction passArray8ToWasm0(arg, malloc) {\n const ptr = malloc(arg.length * 1, 1) >>> 0;\n getUint8Memory0().set(arg, ptr / 1);\n WASM_VECTOR_LEN = arg.length;\n return ptr;\n}\n/**\n* Verify an execution with a single function and a single transition. Executions with multiple\n* transitions or functions will fail to verify. Also, this does not verify that the state root of\n* the execution is included in the Aleo Network ledger.\n*\n* @param {Execution} execution The function execution to verify\n* @param {VerifyingKey} verifying_key The verifying key for the function\n* @param {Program} program The program that the function execution belongs to\n* @param {String} function_id The name of the function that was executed\n* @returns {boolean} True if the execution is valid, false otherwise\n* @param {Execution} execution\n* @param {VerifyingKey} verifying_key\n* @param {Program} program\n* @param {string} function_id\n* @returns {boolean}\n*/\nfunction verifyFunctionExecution(execution, verifying_key, program, function_id) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(execution, Execution);\n _assertClass(verifying_key, VerifyingKey);\n _assertClass(program, Program);\n const ptr0 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyFunctionExecution(retptr, execution.__wbg_ptr, verifying_key.__wbg_ptr, program.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return r0 !== 0;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n}\n\nlet cachedBigInt64Memory0 = null;\n\nfunction getBigInt64Memory0() {\n if (cachedBigInt64Memory0 === null || cachedBigInt64Memory0.buffer !== wasm.memory.buffer) {\n cachedBigInt64Memory0 = new BigInt64Array(wasm.memory.buffer);\n }\n return cachedBigInt64Memory0;\n}\n\nfunction getArrayU8FromWasm0(ptr, len) {\n ptr = ptr >>> 0;\n return getUint8Memory0().subarray(ptr / 1, ptr / 1 + len);\n}\n/**\n* @param {number} receiver\n*/\nfunction runRayonThread(receiver) {\n wasm.runRayonThread(receiver);\n}\n\n/**\n* @param {URL} url\n* @param {number} num_threads\n* @returns {Promise}\n*/\nfunction initThreadPool(url, num_threads) {\n const ret = wasm.initThreadPool(addHeapObject(url), num_threads);\n return takeObject(ret);\n}\n\nfunction handleError(f, args) {\n try {\n return f.apply(this, args);\n } catch (e) {\n wasm.__wbindgen_exn_store(addHeapObject(e));\n }\n}\nfunction __wbg_adapter_281(arg0, arg1, arg2, arg3) {\n wasm.wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7(arg0, arg1, addHeapObject(arg2), addHeapObject(arg3));\n}\n\nconst AddressFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_address_free(ptr >>> 0));\n/**\n* Public address of an Aleo account\n*/\nclass Address {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Address.prototype);\n obj.__wbg_ptr = ptr;\n AddressFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n AddressFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_address_free(ptr);\n }\n /**\n * Derive an Aleo address from a private key\n *\n * @param {PrivateKey} private_key The private key to derive the address from\n * @returns {Address} Address corresponding to the private key\n * @param {PrivateKey} private_key\n * @returns {Address}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.address_from_private_key(private_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Derive an Aleo address from a view key\n *\n * @param {ViewKey} view_key The view key to derive the address from\n * @returns {Address} Address corresponding to the view key\n * @param {ViewKey} view_key\n * @returns {Address}\n */\n static from_view_key(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.address_from_view_key(view_key.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Create an aleo address object from a string representation of an address\n *\n * @param {string} address String representation of an addressm\n * @returns {Address} Address\n * @param {string} address\n * @returns {Address}\n */\n static from_string(address) {\n const ptr0 = passStringToWasm0(address, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.address_from_string(ptr0, len0);\n return Address.__wrap(ret);\n }\n /**\n * Get a string representation of an Aleo address object\n *\n * @param {Address} Address\n * @returns {string} String representation of the address\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.address_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Verify a signature for a message signed by the address\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {boolean} Boolean representing whether or not the signature is valid\n * @param {Uint8Array} message\n * @param {Signature} signature\n * @returns {boolean}\n */\n verify(message, signature) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n _assertClass(signature, Signature);\n const ret = wasm.address_verify(this.__wbg_ptr, ptr0, len0, signature.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst ExecutionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_execution_free(ptr >>> 0));\n/**\n* Execution of an Aleo program.\n*/\nclass Execution {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Execution.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_execution_free(ptr);\n }\n /**\n * Returns the string representation of the execution.\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.execution_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates an execution object from a string representation of an execution.\n * @param {string} execution\n * @returns {Execution}\n */\n static fromString(execution) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(execution, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.execution_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Execution.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ExecutionResponseFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_executionresponse_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo function execution response\n*\n* This object is returned by the execution of an Aleo function off-chain. It provides methods for\n* retrieving the outputs of the function execution.\n*/\nclass ExecutionResponse {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ExecutionResponse.prototype);\n obj.__wbg_ptr = ptr;\n ExecutionResponseFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ExecutionResponseFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_executionresponse_free(ptr);\n }\n /**\n * Get the outputs of the executed function\n *\n * @returns {Array} Array of strings representing the outputs of the function\n * @returns {Array}\n */\n getOutputs() {\n const ret = wasm.executionresponse_getOutputs(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Returns the execution object if present, null if otherwise.\n *\n * @returns {Execution | undefined} The execution object if present, null if otherwise\n * @returns {Execution | undefined}\n */\n getExecution() {\n const ret = wasm.executionresponse_getExecution(this.__wbg_ptr);\n return ret === 0 ? undefined : Execution.__wrap(ret);\n }\n /**\n * Returns the program keys if present\n * @returns {KeyPair}\n */\n getKeys() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getKeys(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return KeyPair.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the proving_key if the proving key was cached in the Execution response.\n * Note the proving key is removed from the response object after the first call to this\n * function. Subsequent calls will return null.\n *\n * @returns {ProvingKey | undefined} The proving key\n * @returns {ProvingKey | undefined}\n */\n getProvingKey() {\n const ret = wasm.executionresponse_getProvingKey(this.__wbg_ptr);\n return ret === 0 ? undefined : ProvingKey.__wrap(ret);\n }\n /**\n * Returns the verifying_key associated with the program\n *\n * @returns {VerifyingKey} The verifying key\n * @returns {VerifyingKey}\n */\n getVerifyingKey() {\n const ret = wasm.executionresponse_getVerifyingKey(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the function identifier\n * @returns {string}\n */\n getFunctionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.executionresponse_getFunctionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the program\n * @returns {Program}\n */\n getProgram() {\n const ret = wasm.executionresponse_getProgram(this.__wbg_ptr);\n return Program.__wrap(ret);\n }\n}\n\nconst FieldFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_field_free(ptr >>> 0));\n/**\n*/\nclass Field {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Field.prototype);\n obj.__wbg_ptr = ptr;\n FieldFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n FieldFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_field_free(ptr);\n }\n /**\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.field_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} field\n * @returns {Field}\n */\n static fromString(field) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(field, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.field_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst KeyPairFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_keypair_free(ptr >>> 0));\n/**\n* Key pair object containing both the function proving and verifying keys\n*/\nclass KeyPair {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(KeyPair.prototype);\n obj.__wbg_ptr = ptr;\n KeyPairFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n KeyPairFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_keypair_free(ptr);\n }\n /**\n * Create new key pair from proving and verifying keys\n *\n * @param {ProvingKey} proving_key Proving key corresponding to a function in an Aleo program\n * @param {VerifyingKey} verifying_key Verifying key corresponding to a function in an Aleo program\n * @returns {KeyPair} Key pair object containing both the function proving and verifying keys\n * @param {ProvingKey} proving_key\n * @param {VerifyingKey} verifying_key\n */\n constructor(proving_key, verifying_key) {\n _assertClass(proving_key, ProvingKey);\n var ptr0 = proving_key.__destroy_into_raw();\n _assertClass(verifying_key, VerifyingKey);\n var ptr1 = verifying_key.__destroy_into_raw();\n const ret = wasm.keypair_new(ptr0, ptr1);\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get the proving key. This method will remove the proving key from the key pair\n *\n * @returns {ProvingKey | Error}\n * @returns {ProvingKey}\n */\n provingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_provingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the verifying key. This method will remove the verifying key from the key pair\n *\n * @returns {VerifyingKey | Error}\n * @returns {VerifyingKey}\n */\n verifyingKey() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.keypair_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst MetadataFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_metadata_free(ptr >>> 0));\n/**\n*/\nclass Metadata {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Metadata.prototype);\n obj.__wbg_ptr = ptr;\n MetadataFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n MetadataFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_metadata_free(ptr);\n }\n /**\n * @returns {string}\n */\n get name() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_name(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set name(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_name(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get locator() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_locator(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set locator(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_locator(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get prover() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_prover(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set prover(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_prover(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifier() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifier(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifier(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifier(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n get verifyingKey() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.__wbg_get_metadata_verifyingKey(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @param {string} arg0\n */\n set verifyingKey(arg0) {\n const ptr0 = passStringToWasm0(arg0, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.__wbg_set_metadata_verifyingKey(this.__wbg_ptr, ptr0, len0);\n }\n /**\n * @returns {string}\n */\n static baseUrl() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.metadata_baseUrl(retptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * @returns {Metadata}\n */\n static bond_public() {\n const ret = wasm.metadata_bond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static bond_validator() {\n const ret = wasm.metadata_bond_validator();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static claim_unbond_public() {\n const ret = wasm.metadata_claim_unbond_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_private() {\n const ret = wasm.metadata_fee_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static fee_public() {\n const ret = wasm.metadata_fee_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static inclusion() {\n const ret = wasm.metadata_inclusion();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static join() {\n const ret = wasm.metadata_join();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static set_validator_state() {\n const ret = wasm.metadata_set_validator_state();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static split() {\n const ret = wasm.metadata_split();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private() {\n const ret = wasm.metadata_transfer_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_private_to_public() {\n const ret = wasm.metadata_transfer_private_to_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public() {\n const ret = wasm.metadata_transfer_public();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_as_signer() {\n const ret = wasm.metadata_transfer_public_as_signer();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static transfer_public_to_private() {\n const ret = wasm.metadata_transfer_public_to_private();\n return Metadata.__wrap(ret);\n }\n /**\n * @returns {Metadata}\n */\n static unbond_public() {\n const ret = wasm.metadata_unbond_public();\n return Metadata.__wrap(ret);\n }\n}\n\nconst OfflineQueryFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_offlinequery_free(ptr >>> 0));\n/**\n* An offline query object used to insert the global state root and state paths needed to create\n* a valid inclusion proof offline.\n*/\nclass OfflineQuery {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(OfflineQuery.prototype);\n obj.__wbg_ptr = ptr;\n OfflineQueryFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n OfflineQueryFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_offlinequery_free(ptr);\n }\n /**\n * Creates a new offline query object. The state root is required to be passed in as a string\n * @param {string} state_root\n */\n constructor(state_root) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(state_root, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_new(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n this.__wbg_ptr = r0 >>> 0;\n return this;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Add a new state path to the offline query object.\n *\n * @param {string} commitment: The commitment corresponding to a record inpout\n * @param {string} state_path: The state path corresponding to the commitment\n * @param {string} commitment\n * @param {string} state_path\n */\n addStatePath(commitment, state_path) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(commitment, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(state_path, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.offlinequery_addStatePath(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n if (r1) {\n throw takeObject(r0);\n }\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a json string representation of the offline query object\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.offlinequery_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create an offline query object from a json string representation\n * @param {string} s\n * @returns {OfflineQuery}\n */\n static fromString(s) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(s, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.offlinequery_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return OfflineQuery.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekey_free(ptr >>> 0));\n/**\n* Private key of an Aleo account\n*/\nclass PrivateKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKey.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekey_free(ptr);\n }\n /**\n * Generate a new private key using a cryptographically secure random number generator\n *\n * @returns {PrivateKey}\n */\n constructor() {\n const ret = wasm.privatekey_new();\n this.__wbg_ptr = ret >>> 0;\n return this;\n }\n /**\n * Get a private key from a series of unchecked bytes\n *\n * @param {Uint8Array} seed Unchecked 32 byte long Uint8Array acting as the seed for the private key\n * @returns {PrivateKey}\n * @param {Uint8Array} seed\n * @returns {PrivateKey}\n */\n static from_seed_unchecked(seed) {\n const ptr0 = passArray8ToWasm0(seed, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_from_seed_unchecked(ptr0, len0);\n return PrivateKey.__wrap(ret);\n }\n /**\n * Get a private key from a string representation of a private key\n *\n * @param {string} seed String representation of a private key\n * @returns {PrivateKey}\n * @param {string} private_key\n * @returns {PrivateKey}\n */\n static from_string(private_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(private_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_from_string(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the private key. This function should be used very carefully\n * as it exposes the private key plaintext\n *\n * @returns {string} String representation of a private key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the view key corresponding to the private key\n *\n * @returns {ViewKey}\n * @returns {ViewKey}\n */\n to_view_key() {\n const ret = wasm.privatekey_to_view_key(this.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get the address corresponding to the private key\n *\n * @returns {Address}\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.privatekey_to_address(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Sign a message with the private key\n *\n * @param {Uint8Array} Byte array representing a message signed by the address\n * @returns {Signature} Signature generated by signing the message with the address\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n sign(message) {\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(this.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a new randomly generated private key ciphertext using a secret. The secret is sensitive\n * and will be needed to decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static newEncrypted(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_newEncrypted(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Encrypt an existing private key with a secret. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKeyCiphertext | Error} Ciphertext representation of the private key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n toCiphertext(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get private key from a private key ciphertext and secret originally used to encrypt it\n *\n * @param {PrivateKeyCiphertext} ciphertext Ciphertext representation of the private key\n * @param {string} secret Secret originally used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {PrivateKeyCiphertext} ciphertext\n * @param {string} secret\n * @returns {PrivateKey}\n */\n static fromPrivateKeyCiphertext(ciphertext, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(ciphertext, PrivateKeyCiphertext);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_fromPrivateKeyCiphertext(retptr, ciphertext.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst PrivateKeyCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_privatekeyciphertext_free(ptr >>> 0));\n/**\n* Private Key in ciphertext form\n*/\nclass PrivateKeyCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(PrivateKeyCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n PrivateKeyCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n PrivateKeyCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_privatekeyciphertext_free(ptr);\n }\n /**\n * Encrypt a private key using a secret string. The secret is sensitive and will be needed to\n * decrypt the private key later, so it should be stored securely\n *\n * @param {PrivateKey} private_key Private key to encrypt\n * @param {string} secret Secret to encrypt the private key with\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {PrivateKey} private_key\n * @param {string} secret\n * @returns {PrivateKeyCiphertext}\n */\n static encryptPrivateKey(private_key, secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekey_toCiphertext(retptr, private_key.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Decrypts a private ciphertext using a secret string. This must be the same secret used to\n * encrypt the private key\n *\n * @param {string} secret Secret used to encrypt the private key\n * @returns {PrivateKey | Error} Private key\n * @param {string} secret\n * @returns {PrivateKey}\n */\n decryptToPrivateKey(secret) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(secret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_decryptToPrivateKey(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the ciphertext string\n *\n * @returns {string} Ciphertext string\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.privatekeyciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Creates a PrivateKeyCiphertext from a string\n *\n * @param {string} ciphertext Ciphertext string\n * @returns {PrivateKeyCiphertext | Error} Private key ciphertext\n * @param {string} ciphertext\n * @returns {PrivateKeyCiphertext}\n */\n static fromString(ciphertext) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.privatekeyciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return PrivateKeyCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n}\n\nconst ProgramFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_program_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo program\n*/\nclass Program {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Program.prototype);\n obj.__wbg_ptr = ptr;\n ProgramFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_program_free(ptr);\n }\n /**\n * Create a program from a program string\n *\n * @param {string} program Aleo program source code\n * @returns {Program | Error} Program object\n * @param {string} program\n * @returns {Program}\n */\n static fromString(program) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Program.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the program\n *\n * @returns {string} String containing the program source code\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Determine if a function is present in the program\n *\n * @param {string} functionName Name of the function to check for\n * @returns {boolean} True if the program is valid, false otherwise\n * @param {string} function_name\n * @returns {boolean}\n */\n hasFunction(function_name) {\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.program_hasFunction(this.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get javascript array of functions names in the program\n *\n * @returns {Array} Array of all function names present in the program\n *\n * @example\n * const expected_functions = [\n * \"mint\",\n * \"transfer_private\",\n * \"transfer_private_to_public\",\n * \"transfer_public\",\n * \"transfer_public_to_private\",\n * \"join\",\n * \"split\",\n * \"fee\"\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_functions = credits_program.getFunctions();\n * console.log(credits_functions === expected_functions); // Output should be \"true\"\n * @returns {Array}\n */\n getFunctions() {\n const ret = wasm.program_getFunctions(this.__wbg_ptr);\n return takeObject(ret);\n }\n /**\n * Get a javascript object representation of the function inputs and types. This can be used\n * to generate a web form to capture user inputs for an execution of a function.\n *\n * @param {string} function_name Name of the function to get inputs for\n * @returns {Array | Error} Array of function inputs\n *\n * @example\n * const expected_inputs = [\n * {\n * type:\"record\",\n * visibility:\"private\",\n * record:\"credits\",\n * members:[\n * {\n * name:\"microcredits\",\n * type:\"u64\",\n * visibility:\"private\"\n * }\n * ],\n * register:\"r0\"\n * },\n * {\n * type:\"address\",\n * visibility:\"private\",\n * register:\"r1\"\n * },\n * {\n * type:\"u64\",\n * visibility:\"private\",\n * register:\"r2\"\n * }\n * ];\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const transfer_function_inputs = credits_program.getFunctionInputs(\"transfer_private\");\n * console.log(transfer_function_inputs === expected_inputs); // Output should be \"true\"\n * @param {string} function_name\n * @returns {Array}\n */\n getFunctionInputs(function_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(function_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getFunctionInputs(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a the list of a program's mappings and the names/types of their keys and values.\n *\n * @returns {Array | Error} - An array of objects representing the mappings in the program\n * @example\n * const expected_mappings = [\n * {\n * name: \"account\",\n * key_name: \"owner\",\n * key_type: \"address\",\n * value_name: \"microcredits\",\n * value_type: \"u64\"\n * }\n * ]\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_mappings = credits_program.getMappings();\n * console.log(credits_mappings === expected_mappings); // Output should be \"true\"\n * @returns {Array}\n */\n getMappings() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_getMappings(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program record and its types\n *\n * @param {string} record_name Name of the record to get members for\n * @returns {Object | Error} Object containing the record name, type, and members\n *\n * @example\n *\n * const expected_record = {\n * type: \"record\",\n * record: \"Credits\",\n * members: [\n * {\n * name: \"owner\",\n * type: \"address\",\n * visibility: \"private\"\n * },\n * {\n * name: \"microcredits\",\n * type: \"u64\",\n * visibility: \"private\"\n * }\n * ];\n * };\n *\n * const credits_program = aleo_wasm.Program.getCreditsProgram();\n * const credits_record = credits_program.getRecordMembers(\"Credits\");\n * console.log(credits_record === expected_record); // Output should be \"true\"\n * @param {string} record_name\n * @returns {object}\n */\n getRecordMembers(record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getRecordMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a javascript object representation of a program struct and its types\n *\n * @param {string} struct_name Name of the struct to get members for\n * @returns {Array | Error} Array containing the struct members\n *\n * @example\n *\n * const STRUCT_PROGRAM = \"program token_issue.aleo;\n *\n * struct token_metadata:\n * network as u32;\n * version as u32;\n *\n * struct token:\n * token_id as u32;\n * metadata as token_metadata;\n *\n * function no_op:\n * input r0 as u64;\n * output r0 as u64;\"\n *\n * const expected_struct_members = [\n * {\n * name: \"token_id\",\n * type: \"u32\",\n * },\n * {\n * name: \"metadata\",\n * type: \"struct\",\n * struct_id: \"token_metadata\",\n * members: [\n * {\n * name: \"network\",\n * type: \"u32\",\n * }\n * {\n * name: \"version\",\n * type: \"u32\",\n * }\n * ]\n * }\n * ];\n *\n * const program = aleo_wasm.Program.fromString(STRUCT_PROGRAM);\n * const struct_members = program.getStructMembers(\"token\");\n * console.log(struct_members === expected_struct_members); // Output should be \"true\"\n * @param {string} struct_name\n * @returns {Array}\n */\n getStructMembers(struct_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(struct_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.program_getStructMembers(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return takeObject(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the credits.aleo program\n *\n * @returns {Program} The credits.aleo program\n * @returns {Program}\n */\n static getCreditsProgram() {\n const ret = wasm.program_getCreditsProgram();\n return Program.__wrap(ret);\n }\n /**\n * Get the id of the program\n *\n * @returns {string} The id of the program\n * @returns {string}\n */\n id() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_id(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get a unique address of the program\n *\n * @returns {Address} The address of the program\n * @returns {Address}\n */\n address() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.program_address(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Address.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determine equality with another program\n *\n * @param {Program} other The other program to compare\n * @returns {boolean} True if the programs are equal, false otherwise\n * @param {Program} other\n * @returns {boolean}\n */\n isEqual(other) {\n _assertClass(other, Program);\n const ret = wasm.program_isEqual(this.__wbg_ptr, other.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get program_imports\n *\n * @returns {Array} The program imports\n *\n * @example\n *\n * const DOUBLE_TEST = \"import multiply_test.aleo;\n *\n * program double_test.aleo;\n *\n * function double_it:\n * input r0 as u32.private;\n * call multiply_test.aleo/multiply 2u32 r0 into r1;\n * output r1 as u32.private;\";\n *\n * const expected_imports = [\n * \"multiply_test.aleo\"\n * ];\n *\n * const program = aleo_wasm.Program.fromString(DOUBLE_TEST_PROGRAM);\n * const imports = program.getImports();\n * console.log(imports === expected_imports); // Output should be \"true\"\n * @returns {Array}\n */\n getImports() {\n const ret = wasm.program_getImports(this.__wbg_ptr);\n return takeObject(ret);\n }\n}\n\nconst ProgramManagerFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_programmanager_free(ptr >>> 0));\n/**\n*/\nclass ProgramManager {\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProgramManagerFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_programmanager_free(ptr);\n }\n /**\n * Deploy an Aleo program\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being deployed\n * @param imports A javascript object holding the source code of any imported programs in the\n * form \\{\"program_name1\": \"program_source_code\", \"program_name2\": \"program_source_code\", ..\\}.\n * Note that all imported programs must be deployed on chain before the main program in order\n * for the deployment to succeed\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the program deployment in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildDeploymentTransaction(private_key, program, fee_credits, fee_record, url, imports, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n let ptr1 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr1 = fee_record.__destroy_into_raw();\n }\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr3 = fee_proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr4 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildDeploymentTransaction(private_key.__wbg_ptr, ptr0, len0, fee_credits, ptr1, ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the fee for a program deployment\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The source code of the program being deployed\n * @param imports (optional) Provide a list of imports to use for the deployment fee estimation\n * in the form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @returns {u64 | Error}\n * @param {string} program\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static estimateDeploymentFee(program, imports) {\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_estimateDeploymentFee(ptr0, len0, isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n /**\n * Estimate the component of the deployment cost which comes from the fee for the program name.\n * Note that this cost does not represent the entire cost of deployment. It is additional to\n * the cost of the size (in bytes) of the deployment.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param name The name of the program to be deployed\n * @returns {u64 | Error}\n * @param {string} name\n * @returns {bigint}\n */\n static estimateProgramNameCost(name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateProgramNameCost(retptr, ptr0, len0);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Execute an arbitrary function locally\n *\n * @param {PrivateKey} private_key The private key of the sender\n * @param {string} program The source code of the program being executed\n * @param {string} function The name of the function to execute\n * @param {Array} inputs A javascript array of inputs to the function\n * @param {boolean} prove_execution If true, the execution will be proven and an execution object\n * containing the proof and the encrypted inputs and outputs needed to verify the proof offline\n * will be returned.\n * @param {boolean} cache Cache the proving and verifying keys in the Execution response.\n * If this is set to 'true' the keys synthesized will be stored in the Execution Response\n * and the `ProvingKey` and `VerifyingKey` can be retrieved from the response via the `.getKeys()`\n * method.\n * @param {Object | undefined} imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param {ProvingKey | undefined} proving_key (optional) Provide a verifying key to use for the function execution\n * @param {VerifyingKey | undefined} verifying_key (optional) Provide a verifying key to use for the function execution\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {boolean} prove_execution\n * @param {boolean} cache\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {string | undefined} [url]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static executeFunctionOffline(private_key, program, _function, inputs, prove_execution, cache, imports, proving_key, verifying_key, url, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr2 = proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr3 = verifying_key.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_executeFunctionOffline(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), prove_execution, cache, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr2, ptr3, ptr4, len4, ptr5);\n return takeObject(ret);\n }\n /**\n * Execute Aleo function and create an Aleo execution transaction\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program being executed\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * If this is set to 'true' the keys synthesized (or passed in as optional parameters via the\n * `proving_key` and `verifying_key` arguments) will be stored in the ProgramManager's memory\n * and used for subsequent transactions. If this is set to 'false' the proving and verifying\n * keys will be deallocated from memory after the transaction is executed.\n * @param imports (optional) Provide a list of imports to use for the function execution in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the function execution\n * @param verifying_key (optional) Provide a verifying key to use for the function execution\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildExecutionTransaction(private_key, program, _function, inputs, fee_credits, fee_record, url, imports, proving_key, verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr4 = proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr5 = verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildExecutionTransaction(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), fee_credits, ptr2, ptr3, len3, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Estimate Fee for Aleo function execution. Note if \"cache\" is set to true, the proving and\n * verifying keys will be stored in the ProgramManager's memory and used for subsequent\n * program executions.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param private_key The private key of the sender\n * @param program The source code of the program to estimate the execution fee for\n * @param function The name of the function to execute\n * @param inputs A javascript array of inputs to the function\n * @param url The url of the Aleo network node to send the transaction to\n * @param imports (optional) Provide a list of imports to use for the fee estimation in the\n * form of a javascript object where the keys are a string of the program name and the values\n * are a string representing the program source code \\{ \"hello.aleo\": \"hello.aleo source code\" \\}\n * @param proving_key (optional) Provide a verifying key to use for the fee estimation\n * @param verifying_key (optional) Provide a verifying key to use for the fee estimation\n * @returns {u64 | Error} Fee in microcredits\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} _function\n * @param {Array} inputs\n * @param {string | undefined} [url]\n * @param {object | undefined} [imports]\n * @param {ProvingKey | undefined} [proving_key]\n * @param {VerifyingKey | undefined} [verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static estimateExecutionFee(private_key, program, _function, inputs, url, imports, proving_key, verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n var ptr2 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len2 = WASM_VECTOR_LEN;\n let ptr3 = 0;\n if (!isLikeNone(proving_key)) {\n _assertClass(proving_key, ProvingKey);\n ptr3 = proving_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(verifying_key)) {\n _assertClass(verifying_key, VerifyingKey);\n ptr4 = verifying_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr5 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_estimateExecutionFee(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), ptr2, len2, isLikeNone(imports) ? 0 : addHeapObject(imports), ptr3, ptr4, ptr5);\n return takeObject(ret);\n }\n /**\n * Estimate the finalize fee component for executing a function. This fee is additional to the\n * size of the execution of the program in bytes. If the function does not have a finalize\n * step, then the finalize fee is 0.\n *\n * Disclaimer: Fee estimation is experimental and may not represent a correct estimate on any current or future network\n *\n * @param program The program containing the function to estimate the finalize fee for\n * @param function The function to estimate the finalize fee for\n * @returns {u64 | Error} Fee in microcredits\n * @param {string} program\n * @param {string} _function\n * @returns {bigint}\n */\n static estimateFinalizeFee(program, _function) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(_function, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.programmanager_estimateFinalizeFee(retptr, ptr0, len0, ptr1, len1);\n var r0 = getBigInt64Memory0()[retptr / 8 + 0];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n return BigInt.asUintN(64, r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Join two records together to create a new record with an amount of credits equal to the sum\n * of the credits of the two original records\n *\n * @param private_key The private key of the sender\n * @param record_1 The first record to combine\n * @param record_2 The second record to combine\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param join_proving_key (optional) Provide a proving key to use for the join function\n * @param join_verifying_key (optional) Provide a verifying key to use for the join function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {RecordPlaintext} record_1\n * @param {RecordPlaintext} record_2\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [join_proving_key]\n * @param {VerifyingKey | undefined} [join_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildJoinTransaction(private_key, record_1, record_2, fee_credits, fee_record, url, join_proving_key, join_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(record_1, RecordPlaintext);\n var ptr0 = record_1.__destroy_into_raw();\n _assertClass(record_2, RecordPlaintext);\n var ptr1 = record_2.__destroy_into_raw();\n let ptr2 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr2 = fee_record.__destroy_into_raw();\n }\n var ptr3 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len3 = WASM_VECTOR_LEN;\n let ptr4 = 0;\n if (!isLikeNone(join_proving_key)) {\n _assertClass(join_proving_key, ProvingKey);\n ptr4 = join_proving_key.__destroy_into_raw();\n }\n let ptr5 = 0;\n if (!isLikeNone(join_verifying_key)) {\n _assertClass(join_verifying_key, VerifyingKey);\n ptr5 = join_verifying_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr6 = fee_proving_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr7 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr8 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildJoinTransaction(private_key.__wbg_ptr, ptr0, ptr1, fee_credits, ptr2, ptr3, len3, ptr4, ptr5, ptr6, ptr7, ptr8);\n return takeObject(ret);\n }\n /**\n * Split an Aleo credits record into two separate records. This function does not require a fee.\n *\n * @param private_key The private key of the sender\n * @param split_amount The amount of the credit split. This amount will be subtracted from the\n * value of the record and two new records will be created with the split amount and the remainder\n * @param amount_record The record to split\n * @param url The url of the Aleo network node to send the transaction to\n * @param split_proving_key (optional) Provide a proving key to use for the split function\n * @param split_verifying_key (optional) Provide a verifying key to use for the split function\n * @returns {Transaction | Error} Transaction object\n * @param {PrivateKey} private_key\n * @param {number} split_amount\n * @param {RecordPlaintext} amount_record\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [split_proving_key]\n * @param {VerifyingKey | undefined} [split_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildSplitTransaction(private_key, split_amount, amount_record, url, split_proving_key, split_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n _assertClass(amount_record, RecordPlaintext);\n var ptr0 = amount_record.__destroy_into_raw();\n var ptr1 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(split_proving_key)) {\n _assertClass(split_proving_key, ProvingKey);\n ptr2 = split_proving_key.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(split_verifying_key)) {\n _assertClass(split_verifying_key, VerifyingKey);\n ptr3 = split_verifying_key.__destroy_into_raw();\n }\n let ptr4 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr4 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildSplitTransaction(private_key.__wbg_ptr, split_amount, ptr0, ptr1, len1, ptr2, ptr3, ptr4);\n return takeObject(ret);\n }\n /**\n * Send credits from one Aleo account to another\n *\n * @param private_key The private key of the sender\n * @param amount_credits The amount of credits to send\n * @param recipient The recipient of the transaction\n * @param transfer_type The type of the transfer (options: \"private\", \"public\", \"private_to_public\", \"public_to_private\")\n * @param amount_record The record to fund the amount from\n * @param fee_credits The amount of credits to pay as a fee\n * @param fee_record The record to spend the fee from\n * @param url The url of the Aleo network node to send the transaction to\n * @param transfer_verifying_key (optional) Provide a verifying key to use for the transfer\n * function\n * @param fee_proving_key (optional) Provide a proving key to use for the fee execution\n * @param fee_verifying_key (optional) Provide a verifying key to use for the fee execution\n * @returns {Transaction | Error}\n * @param {PrivateKey} private_key\n * @param {number} amount_credits\n * @param {string} recipient\n * @param {string} transfer_type\n * @param {RecordPlaintext | undefined} amount_record\n * @param {number} fee_credits\n * @param {RecordPlaintext | undefined} [fee_record]\n * @param {string | undefined} [url]\n * @param {ProvingKey | undefined} [transfer_proving_key]\n * @param {VerifyingKey | undefined} [transfer_verifying_key]\n * @param {ProvingKey | undefined} [fee_proving_key]\n * @param {VerifyingKey | undefined} [fee_verifying_key]\n * @param {OfflineQuery | undefined} [offline_query]\n * @returns {Promise}\n */\n static buildTransferTransaction(private_key, amount_credits, recipient, transfer_type, amount_record, fee_credits, fee_record, url, transfer_proving_key, transfer_verifying_key, fee_proving_key, fee_verifying_key, offline_query) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(recipient, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(transfer_type, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n let ptr2 = 0;\n if (!isLikeNone(amount_record)) {\n _assertClass(amount_record, RecordPlaintext);\n ptr2 = amount_record.__destroy_into_raw();\n }\n let ptr3 = 0;\n if (!isLikeNone(fee_record)) {\n _assertClass(fee_record, RecordPlaintext);\n ptr3 = fee_record.__destroy_into_raw();\n }\n var ptr4 = isLikeNone(url) ? 0 : passStringToWasm0(url, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len4 = WASM_VECTOR_LEN;\n let ptr5 = 0;\n if (!isLikeNone(transfer_proving_key)) {\n _assertClass(transfer_proving_key, ProvingKey);\n ptr5 = transfer_proving_key.__destroy_into_raw();\n }\n let ptr6 = 0;\n if (!isLikeNone(transfer_verifying_key)) {\n _assertClass(transfer_verifying_key, VerifyingKey);\n ptr6 = transfer_verifying_key.__destroy_into_raw();\n }\n let ptr7 = 0;\n if (!isLikeNone(fee_proving_key)) {\n _assertClass(fee_proving_key, ProvingKey);\n ptr7 = fee_proving_key.__destroy_into_raw();\n }\n let ptr8 = 0;\n if (!isLikeNone(fee_verifying_key)) {\n _assertClass(fee_verifying_key, VerifyingKey);\n ptr8 = fee_verifying_key.__destroy_into_raw();\n }\n let ptr9 = 0;\n if (!isLikeNone(offline_query)) {\n _assertClass(offline_query, OfflineQuery);\n ptr9 = offline_query.__destroy_into_raw();\n }\n const ret = wasm.programmanager_buildTransferTransaction(private_key.__wbg_ptr, amount_credits, ptr0, len0, ptr1, len1, ptr2, fee_credits, ptr3, ptr4, len4, ptr5, ptr6, ptr7, ptr8, ptr9);\n return takeObject(ret);\n }\n /**\n * Synthesize proving and verifying keys for a program\n *\n * @param program {string} The program source code of the program to synthesize keys for\n * @param function_id {string} The function to synthesize keys for\n * @param inputs {Array} The inputs to the function\n * @param imports {Object | undefined} The imports for the program\n * @param {PrivateKey} private_key\n * @param {string} program\n * @param {string} function_id\n * @param {Array} inputs\n * @param {object | undefined} [imports]\n * @returns {Promise}\n */\n static synthesizeKeyPair(private_key, program, function_id, inputs, imports) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(function_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n const ret = wasm.programmanager_synthesizeKeyPair(private_key.__wbg_ptr, ptr0, len0, ptr1, len1, addHeapObject(inputs), isLikeNone(imports) ? 0 : addHeapObject(imports));\n return takeObject(ret);\n }\n}\n\nconst ProvingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_provingkey_free(ptr >>> 0));\n/**\n* Proving key for a function within an Aleo program\n*/\nclass ProvingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ProvingKey.prototype);\n obj.__wbg_ptr = ptr;\n ProvingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ProvingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_provingkey_free(ptr);\n }\n /**\n * Verify if the proving key is for the bond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_public_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_public function, false if otherwise\n * @returns {boolean}\n */\n isBondPublicProver() {\n const ret = wasm.provingkey_isBondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the bond_validator function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"bond_validator_proving_key.bin\");\n * provingKey.isBondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the bond_validator function, false if otherwise\n * @returns {boolean}\n */\n isBondValidatorProver() {\n const ret = wasm.provingkey_isBondValidatorProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the claim_unbond function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"claim_unbond_proving_key.bin\");\n * provingKey.isClaimUnbondProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the claim_unbond function, false if otherwise\n * @returns {boolean}\n */\n isClaimUnbondPublicProver() {\n const ret = wasm.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_private_proving_key.bin\");\n * provingKey.isFeePrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_private function, false if otherwise\n * @returns {boolean}\n */\n isFeePrivateProver() {\n const ret = wasm.provingkey_isFeePrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the fee_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"fee_public_proving_key.bin\");\n * provingKey.isFeePublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the fee_public function, false if otherwise\n * @returns {boolean}\n */\n isFeePublicProver() {\n const ret = wasm.provingkey_isFeePublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the inclusion function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"inclusion_proving_key.bin\");\n * provingKey.isInclusionProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the inclusion function, false if otherwise\n * @returns {boolean}\n */\n isInclusionProver() {\n const ret = wasm.provingkey_isInclusionProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the join function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"join_proving_key.bin\");\n * provingKey.isJoinProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the join function, false if otherwise\n * @returns {boolean}\n */\n isJoinProver() {\n const ret = wasm.provingkey_isJoinProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the set_validator_state function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"set_validator_set_proving_key.bin\");\n * provingKey.isSetValidatorStateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the set_validator_state function, false if otherwise\n * @returns {boolean}\n */\n isSetValidatorStateProver() {\n const ret = wasm.provingkey_isSetValidatorStateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the split function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"split_proving_key.bin\");\n * provingKey.isSplitProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the split function, false if otherwise\n * @returns {boolean}\n */\n isSplitProver() {\n const ret = wasm.provingkey_isSplitProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_proving_key.bin\");\n * provingKey.isTransferPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateProver() {\n const ret = wasm.provingkey_isTransferPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_private_to_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_private_to_public_proving_key.bin\");\n * provingKey.isTransferPrivateToPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_private_to_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPrivateToPublicProver() {\n const ret = wasm.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_proving_key.bin\");\n * provingKey.isTransferPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicProver() {\n const ret = wasm.provingkey_isTransferPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_as_signer function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_as_signer_proving_key.bin\");\n * provingKey.isTransferPublicAsSignerProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicAsSignerProver() {\n const ret = wasm.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the transfer_public_to_private function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"transfer_public_to_private_proving_key.bin\");\n * provingKey.isTransferPublicToPrivateProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the transfer_public_to_private function, false if otherwise\n * @returns {boolean}\n */\n isTransferPublicToPrivateProver() {\n const ret = wasm.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verify if the proving key is for the unbond_public function\n *\n * @example\n * const provingKey = ProvingKey.fromBytes(\"unbond_public.bin\");\n * provingKey.isUnbondPublicProver() ? console.log(\"Key verified\") : throw new Error(\"Invalid key\");\n *\n * @returns {boolean} returns true if the proving key is for the unbond_public_prover function, false if otherwise\n * @returns {boolean}\n */\n isUnbondPublicProver() {\n const ret = wasm.provingkey_isUnbondPublicProver(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Return the checksum of the proving key\n *\n * @returns {string} Checksum of the proving key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the proving key\n *\n * @returns {ProvingKey} A copy of the proving key\n * @returns {ProvingKey}\n */\n copy() {\n const ret = wasm.provingkey_copy(this.__wbg_ptr);\n return ProvingKey.__wrap(ret);\n }\n /**\n * Construct a new proving key from a byte array\n *\n * @param {Uint8Array} bytes Byte array representation of a proving key\n * @returns {ProvingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {ProvingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a proving key from string\n *\n * @param {string | Error} String representation of the proving key\n * @param {string} string\n * @returns {ProvingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.provingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return ProvingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the byte representation of a proving key\n *\n * @returns {Uint8Array | Error} Byte array representation of a proving key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the proving key\n *\n * @returns {string} String representation of the proving key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.provingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst RecordCiphertextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordciphertext_free(ptr >>> 0));\n/**\n* Encrypted Aleo record\n*/\nclass RecordCiphertext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordCiphertext.prototype);\n obj.__wbg_ptr = ptr;\n RecordCiphertextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordCiphertextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordciphertext_free(ptr);\n }\n /**\n * Create a record ciphertext from a string\n *\n * @param {string} record String representation of a record ciphertext\n * @returns {RecordCiphertext | Error} Record ciphertext\n * @param {string} record\n * @returns {RecordCiphertext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordciphertext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordCiphertext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return the string reprensentation of the record ciphertext\n *\n * @returns {string} String representation of the record ciphertext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordciphertext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Decrypt the record ciphertext into plaintext using the view key. The record will only\n * decrypt if the record was encrypted by the account corresponding to the view key\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {RecordPlaintext | Error} Record plaintext object\n * @param {ViewKey} view_key\n * @returns {RecordPlaintext}\n */\n decrypt(view_key) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(view_key, ViewKey);\n wasm.recordciphertext_decrypt(retptr, this.__wbg_ptr, view_key.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Determines if the account corresponding to the view key is the owner of the record\n *\n * @param {ViewKey} view_key View key used to decrypt the ciphertext\n * @returns {boolean}\n * @param {ViewKey} view_key\n * @returns {boolean}\n */\n isOwner(view_key) {\n _assertClass(view_key, ViewKey);\n const ret = wasm.recordciphertext_isOwner(this.__wbg_ptr, view_key.__wbg_ptr);\n return ret !== 0;\n }\n}\n\nconst RecordPlaintextFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_recordplaintext_free(ptr >>> 0));\n/**\n* Plaintext representation of an Aleo record\n*/\nclass RecordPlaintext {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(RecordPlaintext.prototype);\n obj.__wbg_ptr = ptr;\n RecordPlaintextFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n RecordPlaintextFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_recordplaintext_free(ptr);\n }\n /**\n * @param {string} program_id\n * @param {string} record_name\n * @returns {Field}\n */\n commitment(program_id, record_name) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_commitment(retptr, this.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Field.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Return a record plaintext from a string.\n *\n * @param {string} record String representation of a plaintext representation of an Aleo record\n * @returns {RecordPlaintext | Error} Record plaintext\n * @param {string} record\n * @returns {RecordPlaintext}\n */\n static fromString(record) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(record, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.recordplaintext_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return RecordPlaintext.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Returns the record plaintext string\n *\n * @returns {string} String representation of the record plaintext\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Returns the amount of microcredits in the record\n *\n * @returns {u64} Amount of microcredits in the record\n * @returns {bigint}\n */\n microcredits() {\n const ret = wasm.recordplaintext_microcredits(this.__wbg_ptr);\n return BigInt.asUintN(64, ret);\n }\n /**\n * Returns the nonce of the record. This can be used to uniquely identify a record.\n *\n * @returns {string} Nonce of the record\n * @returns {string}\n */\n nonce() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.recordplaintext_nonce(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Attempt to get the serial number of a record to determine whether or not is has been spent\n *\n * @param {PrivateKey} private_key Private key of the account that owns the record\n * @param {string} program_id Program ID of the program that the record is associated with\n * @param {string} record_name Name of the record\n * @returns {string | Error} Serial number of the record\n * @param {PrivateKey} private_key\n * @param {string} program_id\n * @param {string} record_name\n * @returns {string}\n */\n serialNumberString(private_key, program_id, record_name) {\n let deferred4_0;\n let deferred4_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n _assertClass(private_key, PrivateKey);\n const ptr0 = passStringToWasm0(program_id, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ptr1 = passStringToWasm0(record_name, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n wasm.recordplaintext_serialNumberString(retptr, this.__wbg_ptr, private_key.__wbg_ptr, ptr0, len0, ptr1, len1);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr3 = r0;\n var len3 = r1;\n if (r3) {\n ptr3 = 0; len3 = 0;\n throw takeObject(r2);\n }\n deferred4_0 = ptr3;\n deferred4_1 = len3;\n return getStringFromWasm0(ptr3, len3);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred4_0, deferred4_1, 1);\n }\n }\n}\n\nconst SignatureFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_signature_free(ptr >>> 0));\n/**\n* Cryptographic signature of a message signed by an Aleo account\n*/\nclass Signature {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Signature.prototype);\n obj.__wbg_ptr = ptr;\n SignatureFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n SignatureFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_signature_free(ptr);\n }\n /**\n * Sign a message with a private key\n *\n * @param {PrivateKey} private_key The private key to sign the message with\n * @param {Uint8Array} message Byte representation of the message to sign\n * @returns {Signature} Signature of the message\n * @param {PrivateKey} private_key\n * @param {Uint8Array} message\n * @returns {Signature}\n */\n static sign(private_key, message) {\n _assertClass(private_key, PrivateKey);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.privatekey_sign(private_key.__wbg_ptr, ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Verify a signature of a message with an address\n *\n * @param {Address} address The address to verify the signature with\n * @param {Uint8Array} message Byte representation of the message to verify\n * @returns {boolean} True if the signature is valid, false otherwise\n * @param {Address} address\n * @param {Uint8Array} message\n * @returns {boolean}\n */\n verify(address, message) {\n _assertClass(address, Address);\n const ptr0 = passArray8ToWasm0(message, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_verify(this.__wbg_ptr, address.__wbg_ptr, ptr0, len0);\n return ret !== 0;\n }\n /**\n * Get a signature from a string representation of a signature\n *\n * @param {string} signature String representation of a signature\n * @returns {Signature} Signature\n * @param {string} signature\n * @returns {Signature}\n */\n static from_string(signature) {\n const ptr0 = passStringToWasm0(signature, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.signature_from_string(ptr0, len0);\n return Signature.__wrap(ret);\n }\n /**\n * Get a string representation of a signature\n *\n * @returns {string} String representation of a signature\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.signature_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst TransactionFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_transaction_free(ptr >>> 0));\n/**\n* Webassembly Representation of an Aleo transaction\n*\n* This object is created when generating an on-chain function deployment or execution and is the\n* object that should be submitted to the Aleo Network in order to deploy or execute a function.\n*/\nclass Transaction {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(Transaction.prototype);\n obj.__wbg_ptr = ptr;\n TransactionFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n TransactionFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_transaction_free(ptr);\n }\n /**\n * Create a transaction from a string\n *\n * @param {string} transaction String representation of a transaction\n * @returns {Transaction | Error}\n * @param {string} transaction\n * @returns {Transaction}\n */\n static fromString(transaction) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(transaction, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.transaction_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return Transaction.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get the transaction as a string. If you want to submit this transaction to the Aleo Network\n * this function will create the string that should be submitted in the `POST` data.\n *\n * @returns {string} String representation of the transaction\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the id of the transaction. This is the merkle root of the transaction's inclusion proof.\n *\n * This value can be used to query the status of the transaction on the Aleo Network to see\n * if it was successful. If successful, the transaction will be included in a block and this\n * value can be used to lookup the transaction data on-chain.\n *\n * @returns {string} Transaction id\n * @returns {string}\n */\n transactionId() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionId(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the type of the transaction (will return \"deploy\" or \"execute\")\n *\n * @returns {string} Transaction type\n * @returns {string}\n */\n transactionType() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.transaction_transactionType(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst VerifyingKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_verifyingkey_free(ptr >>> 0));\n/**\n* Verifying key for a function within an Aleo program\n*/\nclass VerifyingKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(VerifyingKey.prototype);\n obj.__wbg_ptr = ptr;\n VerifyingKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n VerifyingKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_verifyingkey_free(ptr);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {VerifyingKey}\n */\n static bondPublicVerifier() {\n const ret = wasm.verifyingkey_bondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {VerifyingKey}\n */\n static bondValidatorVerifier() {\n const ret = wasm.verifyingkey_bondValidatorVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the claim_delegator function\n *\n * @returns {VerifyingKey} Verifying key for the claim_unbond_public function\n * @returns {VerifyingKey}\n */\n static claimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_claimUnbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_private function\n *\n * @returns {VerifyingKey} Verifying key for the fee_private function\n * @returns {VerifyingKey}\n */\n static feePrivateVerifier() {\n const ret = wasm.verifyingkey_feePrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the fee_public function\n *\n * @returns {VerifyingKey} Verifying key for the fee_public function\n * @returns {VerifyingKey}\n */\n static feePublicVerifier() {\n const ret = wasm.verifyingkey_feePublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the inclusion function\n *\n * @returns {VerifyingKey} Verifying key for the inclusion function\n * @returns {VerifyingKey}\n */\n static inclusionVerifier() {\n const ret = wasm.verifyingkey_inclusionVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the join function\n *\n * @returns {VerifyingKey} Verifying key for the join function\n * @returns {VerifyingKey}\n */\n static joinVerifier() {\n const ret = wasm.verifyingkey_joinVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the set_validator_state function\n *\n * @returns {VerifyingKey} Verifying key for the set_validator_state function\n * @returns {VerifyingKey}\n */\n static setValidatorStateVerifier() {\n const ret = wasm.verifyingkey_setValidatorStateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the split function\n *\n * @returns {VerifyingKey} Verifying key for the split function\n * @returns {VerifyingKey}\n */\n static splitVerifier() {\n const ret = wasm.verifyingkey_splitVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private function\n * @returns {VerifyingKey}\n */\n static transferPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_private_to_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_private_to_public function\n * @returns {VerifyingKey}\n */\n static transferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_transferPrivateToPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public function\n * @returns {VerifyingKey}\n */\n static transferPublicVerifier() {\n const ret = wasm.verifyingkey_transferPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_as_signer function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_as_signer function\n * @returns {VerifyingKey}\n */\n static transferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_transferPublicAsSignerVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the transfer_public_to_private function\n *\n * @returns {VerifyingKey} Verifying key for the transfer_public_to_private function\n * @returns {VerifyingKey}\n */\n static transferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_transferPublicToPrivateVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the unbond_public function\n *\n * @returns {VerifyingKey} Verifying key for the unbond_public function\n * @returns {VerifyingKey}\n */\n static unbondPublicVerifier() {\n const ret = wasm.verifyingkey_unbondPublicVerifier();\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Returns the verifying key for the bond_public function\n *\n * @returns {VerifyingKey} Verifying key for the bond_public function\n * @returns {boolean}\n */\n isBondPublicVerifier() {\n const ret = wasm.verifyingkey_isBondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Returns the verifying key for the bond_validator function\n *\n * @returns {VerifyingKey} Verifying key for the bond_validator function\n * @returns {boolean}\n */\n isBondValidatorVerifier() {\n const ret = wasm.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the claim_delegator function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isClaimUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePrivateVerifier() {\n const ret = wasm.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the fee_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isFeePublicVerifier() {\n const ret = wasm.verifyingkey_isFeePublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the inclusion function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isInclusionVerifier() {\n const ret = wasm.verifyingkey_isInclusionVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the join function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isJoinVerifier() {\n const ret = wasm.verifyingkey_isJoinVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the set_validator_state function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSetValidatorStateVerifier() {\n const ret = wasm.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the split function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isSplitVerifier() {\n const ret = wasm.verifyingkey_isSplitVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_private_to_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPrivateToPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_as_signer function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicAsSignerVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the transfer_public_to_private function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isTransferPublicToPrivateVerifier() {\n const ret = wasm.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Verifies the verifying key is for the unbond_public function\n *\n * @returns {bool}\n * @returns {boolean}\n */\n isUnbondPublicVerifier() {\n const ret = wasm.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr);\n return ret !== 0;\n }\n /**\n * Get the checksum of the verifying key\n *\n * @returns {string} Checksum of the verifying key\n * @returns {string}\n */\n checksum() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_checksum(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Create a copy of the verifying key\n *\n * @returns {VerifyingKey} A copy of the verifying key\n * @returns {VerifyingKey}\n */\n copy() {\n const ret = wasm.verifyingkey_copy(this.__wbg_ptr);\n return VerifyingKey.__wrap(ret);\n }\n /**\n * Construct a new verifying key from a byte array\n *\n * @param {Uint8Array} bytes Byte representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {Uint8Array} bytes\n * @returns {VerifyingKey}\n */\n static fromBytes(bytes) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passArray8ToWasm0(bytes, wasm.__wbindgen_malloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromBytes(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a verifying key from string\n *\n * @param {String} string String representation of a verifying key\n * @returns {VerifyingKey | Error}\n * @param {string} string\n * @returns {VerifyingKey}\n */\n static fromString(string) {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(string, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.verifyingkey_fromString(retptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n if (r2) {\n throw takeObject(r1);\n }\n return VerifyingKey.__wrap(r0);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Create a byte array from a verifying key\n *\n * @returns {Uint8Array | Error} Byte representation of a verifying key\n * @returns {Uint8Array}\n */\n toBytes() {\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toBytes(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n if (r3) {\n throw takeObject(r2);\n }\n var v1 = getArrayU8FromWasm0(r0, r1).slice();\n wasm.__wbindgen_free(r0, r1 * 1, 1);\n return v1;\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n }\n }\n /**\n * Get a string representation of the verifying key\n *\n * @returns {String} String representation of the verifying key\n * @returns {string}\n */\n toString() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.verifyingkey_toString(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n}\n\nconst ViewKeyFinalization = (typeof FinalizationRegistry === 'undefined')\n ? { register: () => {}, unregister: () => {} }\n : new FinalizationRegistry(ptr => wasm.__wbg_viewkey_free(ptr >>> 0));\n/**\n*/\nclass ViewKey {\n\n static __wrap(ptr) {\n ptr = ptr >>> 0;\n const obj = Object.create(ViewKey.prototype);\n obj.__wbg_ptr = ptr;\n ViewKeyFinalization.register(obj, obj.__wbg_ptr, obj);\n return obj;\n }\n\n __destroy_into_raw() {\n const ptr = this.__wbg_ptr;\n this.__wbg_ptr = 0;\n ViewKeyFinalization.unregister(this);\n return ptr;\n }\n\n free() {\n const ptr = this.__destroy_into_raw();\n wasm.__wbg_viewkey_free(ptr);\n }\n /**\n * Create a new view key from a private key\n *\n * @param {PrivateKey} private_key Private key\n * @returns {ViewKey} View key\n * @param {PrivateKey} private_key\n * @returns {ViewKey}\n */\n static from_private_key(private_key) {\n _assertClass(private_key, PrivateKey);\n const ret = wasm.privatekey_to_view_key(private_key.__wbg_ptr);\n return ViewKey.__wrap(ret);\n }\n /**\n * Create a new view key from a string representation of a view key\n *\n * @param {string} view_key String representation of a view key\n * @returns {ViewKey} View key\n * @param {string} view_key\n * @returns {ViewKey}\n */\n static from_string(view_key) {\n const ptr0 = passStringToWasm0(view_key, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n const ret = wasm.viewkey_from_string(ptr0, len0);\n return ViewKey.__wrap(ret);\n }\n /**\n * Get a string representation of a view key\n *\n * @returns {string} String representation of a view key\n * @returns {string}\n */\n to_string() {\n let deferred1_0;\n let deferred1_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n wasm.viewkey_to_string(retptr, this.__wbg_ptr);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n deferred1_0 = r0;\n deferred1_1 = r1;\n return getStringFromWasm0(r0, r1);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred1_0, deferred1_1, 1);\n }\n }\n /**\n * Get the address corresponding to a view key\n *\n * @returns {Address} Address\n * @returns {Address}\n */\n to_address() {\n const ret = wasm.address_from_view_key(this.__wbg_ptr);\n return Address.__wrap(ret);\n }\n /**\n * Decrypt a record ciphertext with a view key\n *\n * @param {string} ciphertext String representation of a record ciphertext\n * @returns {string} String representation of a record plaintext\n * @param {string} ciphertext\n * @returns {string}\n */\n decrypt(ciphertext) {\n let deferred3_0;\n let deferred3_1;\n try {\n const retptr = wasm.__wbindgen_add_to_stack_pointer(-16);\n const ptr0 = passStringToWasm0(ciphertext, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len0 = WASM_VECTOR_LEN;\n wasm.viewkey_decrypt(retptr, this.__wbg_ptr, ptr0, len0);\n var r0 = getInt32Memory0()[retptr / 4 + 0];\n var r1 = getInt32Memory0()[retptr / 4 + 1];\n var r2 = getInt32Memory0()[retptr / 4 + 2];\n var r3 = getInt32Memory0()[retptr / 4 + 3];\n var ptr2 = r0;\n var len2 = r1;\n if (r3) {\n ptr2 = 0; len2 = 0;\n throw takeObject(r2);\n }\n deferred3_0 = ptr2;\n deferred3_1 = len2;\n return getStringFromWasm0(ptr2, len2);\n } finally {\n wasm.__wbindgen_add_to_stack_pointer(16);\n wasm.__wbindgen_free(deferred3_0, deferred3_1, 1);\n }\n }\n}\n\nasync function __wbg_load(module, imports) {\n if (typeof Response === 'function' && module instanceof Response) {\n if (typeof WebAssembly.instantiateStreaming === 'function') {\n try {\n return await WebAssembly.instantiateStreaming(module, imports);\n\n } catch (e) {\n if (module.headers.get('Content-Type') != 'application/wasm') {\n console.warn(\"`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\\n\", e);\n\n } else {\n throw e;\n }\n }\n }\n\n const bytes = await module.arrayBuffer();\n return await WebAssembly.instantiate(bytes, imports);\n\n } else {\n const instance = await WebAssembly.instantiate(module, imports);\n\n if (instance instanceof WebAssembly.Instance) {\n return { instance, module };\n\n } else {\n return instance;\n }\n }\n}\n\nfunction __wbg_get_imports() {\n const imports = {};\n imports.wbg = {};\n imports.wbg.__wbindgen_object_drop_ref = function(arg0) {\n takeObject(arg0);\n };\n imports.wbg.__wbg_new_71801a555ad9f2aa = function() { return handleError(function () {\n const ret = new XMLHttpRequest();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_overrideMimeType_ee9c51919ceb418b = function() { return handleError(function (arg0, arg1, arg2) {\n getObject(arg0).overrideMimeType(getStringFromWasm0(arg1, arg2));\n }, arguments) };\n imports.wbg.__wbg_open_c9eb0cf2c9d95679 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4, arg5) {\n getObject(arg0).open(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4), arg5 !== 0);\n }, arguments) };\n imports.wbg.__wbg_send_80d29985093c1ec5 = function() { return handleError(function (arg0) {\n getObject(arg0).send();\n }, arguments) };\n imports.wbg.__wbg_response_7c2e2759084f7279 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).response;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_status_d485fb5a478426fb = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).status;\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_72fb9a18b5ae2624 = function() {\n const ret = new Object();\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_string_new = function(arg0, arg1) {\n const ret = getStringFromWasm0(arg0, arg1);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_1f9b04f170055d33 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = Reflect.set(getObject(arg0), getObject(arg1), getObject(arg2));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_new_ab6fd82b10560829 = function() { return handleError(function () {\n const ret = new Headers();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_object_clone_ref = function(arg0) {\n const ret = getObject(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_0d76b0581eca6298 = function() { return handleError(function () {\n const ret = new AbortController();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_signal_a61f78a3478fd9bc = function(arg0) {\n const ret = getObject(arg0).signal;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_append_7bfcb4937d1d5e29 = function() { return handleError(function (arg0, arg1, arg2, arg3, arg4) {\n getObject(arg0).append(getStringFromWasm0(arg1, arg2), getStringFromWasm0(arg3, arg4));\n }, arguments) };\n imports.wbg.__wbg_instanceof_Response_849eb93e75734b6e = function(arg0) {\n let result;\n try {\n result = getObject(arg0) instanceof Response;\n } catch (_) {\n result = false;\n }\n const ret = result;\n return ret;\n };\n imports.wbg.__wbg_status_61a01141acd3cf74 = function(arg0) {\n const ret = getObject(arg0).status;\n return ret;\n };\n imports.wbg.__wbg_url_5f6dc4009ac5f99d = function(arg0, arg1) {\n const ret = getObject(arg1).url;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_headers_9620bfada380764a = function(arg0) {\n const ret = getObject(arg0).headers;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_iterator_2cee6dadfd956dfa = function() {\n const ret = Symbol.iterator;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_get_e3c254076557e348 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.get(getObject(arg0), getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_function = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'function';\n return ret;\n };\n imports.wbg.__wbg_call_27c0f87801dedf93 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg0).call(getObject(arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_object = function(arg0) {\n const val = getObject(arg0);\n const ret = typeof(val) === 'object' && val !== null;\n return ret;\n };\n imports.wbg.__wbg_next_40fc327bfc8770e6 = function(arg0) {\n const ret = getObject(arg0).next;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_next_196c84450b364254 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).next();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_done_298b57d23c0fc80c = function(arg0) {\n const ret = getObject(arg0).done;\n return ret;\n };\n imports.wbg.__wbg_value_d93c65011f51a456 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_abort_2aa7521d5690750e = function(arg0) {\n getObject(arg0).abort();\n };\n imports.wbg.__wbg_stringify_8887fe74e1c50d81 = function() { return handleError(function (arg0) {\n const ret = JSON.stringify(getObject(arg0));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_string_get = function(arg0, arg1) {\n const obj = getObject(arg1);\n const ret = typeof(obj) === 'string' ? obj : undefined;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_log_0159ca40cddf5b15 = function(arg0, arg1) {\n console.log(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_bigint_from_u64 = function(arg0) {\n const ret = BigInt.asUintN(64, arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_call_b3ca7c6051f9bec1 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = getObject(arg0).call(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_transaction_new = function(arg0) {\n const ret = Transaction.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_keypair_new = function(arg0) {\n const ret = KeyPair.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_module = function() {\n const ret = __wbg_init.__wbindgen_wasm_module;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_memory = function() {\n const ret = wasm.memory;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a = function(arg0, arg1, arg2, arg3) {\n const ret = spawnWorker(getObject(arg0), getObject(arg1), getObject(arg2), arg3 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_executionresponse_new = function(arg0) {\n const ret = ExecutionResponse.__wrap(arg0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_66ae46612e7f0234 = function(arg0) {\n const ret = new Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_set_d4638f722068f043 = function(arg0, arg1, arg2) {\n getObject(arg0)[arg1 >>> 0] = takeObject(arg2);\n };\n imports.wbg.__wbindgen_cb_drop = function(arg0) {\n const obj = takeObject(arg0).original;\n if (obj.cnt-- == 1) {\n obj.a = 0;\n return true;\n }\n const ret = false;\n return ret;\n };\n imports.wbg.__wbg_new_16b304a2cfa7ff4a = function() {\n const ret = new Array();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_push_a5b05aedc7234f9f = function(arg0, arg1) {\n const ret = getObject(arg0).push(getObject(arg1));\n return ret;\n };\n imports.wbg.__wbg_arrayBuffer_29931d52c7206b02 = function() { return handleError(function (arg0) {\n const ret = getObject(arg0).arrayBuffer();\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_new_63b92bc8671ed464 = function(arg0) {\n const ret = new Uint8Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_c20a40f15020d68a = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_new_81740750da40724f = function(arg0, arg1) {\n try {\n var state0 = {a: arg0, b: arg1};\n var cb0 = (arg0, arg1) => {\n const a = state0.a;\n state0.a = 0;\n try {\n return __wbg_adapter_281(a, state0.b, arg0, arg1);\n } finally {\n state0.a = a;\n }\n };\n const ret = new Promise(cb0);\n return addHeapObject(ret);\n } finally {\n state0.a = state0.b = 0;\n }\n };\n imports.wbg.__wbindgen_number_new = function(arg0) {\n const ret = arg0;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_abda76e883ba8a5f = function() {\n const ret = new Error();\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_stack_658279fe44541cf6 = function(arg0, arg1) {\n const ret = getObject(arg1).stack;\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_error_f851667af71bcfc6 = function(arg0, arg1) {\n let deferred0_0;\n let deferred0_1;\n try {\n deferred0_0 = arg0;\n deferred0_1 = arg1;\n console.error(getStringFromWasm0(arg0, arg1));\n } finally {\n wasm.__wbindgen_free(deferred0_0, deferred0_1, 1);\n }\n };\n imports.wbg.__wbg_buffer_12d079cc21e14bdb = function(arg0) {\n const ret = getObject(arg0).buffer;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb = function(arg0, arg1, arg2) {\n const ret = new Uint8Array(getObject(arg0), arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_randomFillSync_5c9c955aa56b6049 = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).randomFillSync(takeObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_subarray_a1f73cd4b5b42fe1 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).subarray(arg1 >>> 0, arg2 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_getRandomValues_3aa56aa6edec874c = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).getRandomValues(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_set_a47bac70306a19a7 = function(arg0, arg1, arg2) {\n getObject(arg0).set(getObject(arg1), arg2 >>> 0);\n };\n imports.wbg.__wbg_crypto_1d1f22824a6a080c = function(arg0) {\n const ret = getObject(arg0).crypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_process_4a72847cc503995b = function(arg0) {\n const ret = getObject(arg0).process;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_versions_f686565e586dd935 = function(arg0) {\n const ret = getObject(arg0).versions;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_node_104a2ff8d6ea03a2 = function(arg0) {\n const ret = getObject(arg0).node;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_is_string = function(arg0) {\n const ret = typeof(getObject(arg0)) === 'string';\n return ret;\n };\n imports.wbg.__wbg_require_cca90b1a94a0255b = function() { return handleError(function () {\n const ret = module.require;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_msCrypto_eb05e62b530a1508 = function(arg0) {\n const ret = getObject(arg0).msCrypto;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithlength_e9b4878cebadb3d3 = function(arg0) {\n const ret = new Uint8Array(arg0 >>> 0);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_length_cd7af8117672b8b8 = function(arg0) {\n const ret = getObject(arg0).length;\n return ret;\n };\n imports.wbg.__wbg_get_bd8e338fbd5f5cc8 = function(arg0, arg1) {\n const ret = getObject(arg0)[arg1 >>> 0];\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_self_ce0dbfc45cf2f5be = function() { return handleError(function () {\n const ret = self.self;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_window_c6fb939a7f436783 = function() { return handleError(function () {\n const ret = window.window;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_globalThis_d1e6af4856ba331b = function() { return handleError(function () {\n const ret = globalThis.globalThis;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_global_207b558942527489 = function() { return handleError(function () {\n const ret = global.global;\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbindgen_is_undefined = function(arg0) {\n const ret = getObject(arg0) === undefined;\n return ret;\n };\n imports.wbg.__wbg_newnoargs_e258087cd0daa0ea = function(arg0, arg1) {\n const ret = new Function(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_has_0af94d20077affa2 = function() { return handleError(function (arg0, arg1) {\n const ret = Reflect.has(getObject(arg0), getObject(arg1));\n return ret;\n }, arguments) };\n imports.wbg.__wbg_fetch_bc7c8e27076a5c84 = function(arg0) {\n const ret = fetch(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_fetch_921fad6ef9e883dd = function(arg0, arg1) {\n const ret = getObject(arg0).fetch(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {\n const ret = debugString(getObject(arg1));\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbindgen_throw = function(arg0, arg1) {\n throw new Error(getStringFromWasm0(arg0, arg1));\n };\n imports.wbg.__wbindgen_rethrow = function(arg0) {\n throw takeObject(arg0);\n };\n imports.wbg.__wbg_then_a73caa9a87991566 = function(arg0, arg1, arg2) {\n const ret = getObject(arg0).then(getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_then_0c86a60e8fcfe9f6 = function(arg0, arg1) {\n const ret = getObject(arg0).then(getObject(arg1));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_queueMicrotask_481971b0d87f3dd4 = function(arg0) {\n queueMicrotask(getObject(arg0));\n };\n imports.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6 = function(arg0) {\n const ret = getObject(arg0).queueMicrotask;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_resolve_b0083a7967828ec8 = function(arg0) {\n const ret = Promise.resolve(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_5d743fc9058ba01a = function() {\n const ret = Atomics.waitAsync;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_new_8cccba86b0f574cb = function(arg0) {\n const ret = new Int32Array(getObject(arg0));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_waitAsync_46d5c36955b71a79 = function(arg0, arg1, arg2) {\n const ret = Atomics.waitAsync(getObject(arg0), arg1, arg2);\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_async_19c0400d97cc72fe = function(arg0) {\n const ret = getObject(arg0).async;\n return ret;\n };\n imports.wbg.__wbg_value_571d60108110e917 = function(arg0) {\n const ret = getObject(arg0).value;\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_link_fc1eedd35dc7e0a6 = function(arg0) {\n const ret = \"data:application/javascript,\" + encodeURIComponent(`onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n `);\n const ptr1 = passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n const len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n };\n imports.wbg.__wbg_new_d1187ae36d662ef9 = function() { return handleError(function (arg0, arg1) {\n const ret = new Worker(getStringFromWasm0(arg0, arg1));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_setonmessage_503809e5bb51bd33 = function(arg0, arg1) {\n getObject(arg0).onmessage = getObject(arg1);\n };\n imports.wbg.__wbg_of_6a70eed8d41f469c = function(arg0, arg1, arg2) {\n const ret = Array.of(getObject(arg0), getObject(arg1), getObject(arg2));\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_postMessage_7380d10e8b8269df = function() { return handleError(function (arg0, arg1) {\n getObject(arg0).postMessage(getObject(arg1));\n }, arguments) };\n imports.wbg.__wbg_data_3ce7c145ca4fbcdc = function(arg0) {\n const ret = getObject(arg0).data;\n return addHeapObject(ret);\n };\n imports.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0 = function() { return handleError(function (arg0, arg1, arg2) {\n const ret = new Request(getStringFromWasm0(arg0, arg1), getObject(arg2));\n return addHeapObject(ret);\n }, arguments) };\n imports.wbg.__wbg_responseText_c67ed2d48db10769 = function() { return handleError(function (arg0, arg1) {\n const ret = getObject(arg1).responseText;\n var ptr1 = isLikeNone(ret) ? 0 : passStringToWasm0(ret, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);\n var len1 = WASM_VECTOR_LEN;\n getInt32Memory0()[arg0 / 4 + 1] = len1;\n getInt32Memory0()[arg0 / 4 + 0] = ptr1;\n }, arguments) };\n imports.wbg.__wbindgen_closure_wrapper5837 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n imports.wbg.__wbindgen_closure_wrapper5862 = function(arg0, arg1, arg2) {\n const ret = makeMutClosure(arg0, arg1, 538, __wbg_adapter_34);\n return addHeapObject(ret);\n };\n\n return imports;\n}\n\nfunction __wbg_init_memory(imports, maybe_memory) {\n imports.wbg.memory = maybe_memory || new WebAssembly.Memory({initial:25,maximum:65536,shared:true});\n}\n\nfunction __wbg_finalize_init(instance, module) {\n wasm = instance.exports;\n __wbg_init.__wbindgen_wasm_module = module;\n cachedBigInt64Memory0 = null;\n cachedInt32Memory0 = null;\n cachedUint8Memory0 = null;\n\n wasm.__wbindgen_start();\n return wasm;\n}\n\nfunction initSync(module, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n const imports = __wbg_get_imports();\n\n __wbg_init_memory(imports, maybe_memory);\n\n if (!(module instanceof WebAssembly.Module)) {\n module = new WebAssembly.Module(module);\n }\n\n const instance = new WebAssembly.Instance(module, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nasync function __wbg_init(input, maybe_memory) {\n if (wasm !== undefined) return wasm;\n\n\n const imports = __wbg_get_imports();\n\n if (typeof input === 'string' || (typeof Request === 'function' && input instanceof Request) || (typeof URL === 'function' && input instanceof URL)) {\n input = fetch(input);\n }\n\n __wbg_init_memory(imports, maybe_memory);\n\n const { instance, module } = await __wbg_load(await input, imports);\n\n return __wbg_finalize_init(instance, module);\n}\n\nvar exports = /*#__PURE__*/Object.freeze({\n __proto__: null,\n Address: Address,\n Execution: Execution,\n ExecutionResponse: ExecutionResponse,\n Field: Field,\n KeyPair: KeyPair,\n Metadata: Metadata,\n OfflineQuery: OfflineQuery,\n PrivateKey: PrivateKey,\n PrivateKeyCiphertext: PrivateKeyCiphertext,\n Program: Program,\n ProgramManager: ProgramManager,\n ProvingKey: ProvingKey,\n RecordCiphertext: RecordCiphertext,\n RecordPlaintext: RecordPlaintext,\n Signature: Signature,\n Transaction: Transaction,\n VerifyingKey: VerifyingKey,\n ViewKey: ViewKey,\n default: __wbg_init,\n initSync: initSync,\n initThreadPool: initThreadPool,\n runRayonThread: runRayonThread,\n verifyFunctionExecution: verifyFunctionExecution\n});\n\nconst wasm_path = \"assets/aleo_wasm.wasm\";\n\n \n var Cargo = async (opt = {}) => {\n let {importHook, serverPath, initializeHook} = opt;\n\n let final_path = wasm_path;\n\n if (serverPath != null) {\n final_path = serverPath + /[^\\/\\\\]*$/.exec(final_path)[0];\n }\n\n if (importHook != null) {\n final_path = importHook(final_path);\n }\n\n if (initializeHook != null) {\n await initializeHook(__wbg_init, final_path);\n\n } else {\n await __wbg_init(final_path);\n }\n\n return exports;\n };\n\nexport { Cargo as default };\n//# sourceMappingURL=wasm.js.map\n","import wasm from \"../dist/wasm.js\";\n\nconst {\n initThreadPool: wasmInitThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n Private,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n} = await wasm({\n importHook: () => {\n return new URL(\"assets/aleo_wasm.wasm\", import.meta.url);\n },\n});\n\nasync function initThreadPool(threads) {\n if (threads == null) {\n threads = navigator.hardwareConcurrency;\n }\n\n console.info(`Spawning ${threads} threads`);\n\n await wasmInitThreadPool(new URL(\"worker.js\", import.meta.url), threads);\n}\n\nexport {\n initThreadPool,\n Address,\n Execution,\n ExecutionResponse,\n Field,\n Metadata,\n OfflineQuery,\n PrivateKey,\n PrivateKeyCiphertext,\n Program,\n ProvingKey,\n RecordCiphertext,\n RecordPlaintext,\n ProgramManager,\n Signature,\n Transaction,\n ViewKey,\n VerifyingKey,\n verifyFunctionExecution,\n};\n"],"names":["spawnWorker","url","module","memory","address","Promise","resolve","worker","Worker","type","addEventListener","event","setTimeout","unref","capture","once","postMessage","wasm","heap","Array","fill","undefined","getObject","idx","push","heap_next","length","dropObject","takeObject","ret","cachedTextDecoder","TextDecoder","ignoreBOM","fatal","decode","Error","cachedUint8Memory0","getUint8Memory0","buffer","Uint8Array","getStringFromWasm0","ptr","len","slice","addHeapObject","obj","WASM_VECTOR_LEN","cachedTextEncoder","TextEncoder","encode","encodeString","arg","view","buf","set","read","written","passStringToWasm0","malloc","realloc","subarray","mem","offset","code","charCodeAt","isLikeNone","x","cachedInt32Memory0","getInt32Memory0","Int32Array","debugString","val","description","name","isArray","debug","i","builtInMatches","exec","toString","call","className","JSON","stringify","_","message","stack","CLOSURE_DTORS","FinalizationRegistry","register","unregister","state","__wbindgen_export_3","get","dtor","a","b","makeMutClosure","arg0","arg1","f","cnt","real","args","original","__wbg_adapter_34","arg2","_dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h467700a9696faab3","_assertClass","instance","klass","passArray8ToWasm0","verifyFunctionExecution$1","execution","verifying_key","program","function_id","retptr","__wbindgen_add_to_stack_pointer","Execution$1","VerifyingKey$1","Program$1","ptr0","__wbindgen_malloc","__wbindgen_realloc","len0","verifyFunctionExecution","__wbg_ptr","r0","r1","cachedBigInt64Memory0","getBigInt64Memory0","BigInt64Array","getArrayU8FromWasm0","runRayonThread","receiver","initThreadPool$1","num_threads","initThreadPool","handleError","apply","this","e","__wbindgen_exn_store","__wbg_adapter_281","arg3","wasm_bindgen__convert__closures__invoke2_mut__h381bef3cd886b4c7","AddressFinalization","__wbg_address_free","Address","__wrap","Object","create","prototype","__destroy_into_raw","free","from_private_key","private_key","PrivateKey$1","address_from_private_key","from_view_key","view_key","ViewKey$1","address_from_view_key","from_string","address_from_string","to_string","deferred1_0","deferred1_1","address_to_string","__wbindgen_free","verify","signature","Signature$1","address_verify","ExecutionFinalization","__wbg_execution_free","Execution","execution_toString","fromString","execution_fromString","ExecutionResponseFinalization","__wbg_executionresponse_free","ExecutionResponse","getOutputs","executionresponse_getOutputs","getExecution","executionresponse_getExecution","getKeys","executionresponse_getKeys","KeyPair","getProvingKey","executionresponse_getProvingKey","ProvingKey$1","getVerifyingKey","executionresponse_getVerifyingKey","getFunctionId","executionresponse_getFunctionId","getProgram","executionresponse_getProgram","FieldFinalization","__wbg_field_free","Field","field_toString","field","field_fromString","KeyPairFinalization","__wbg_keypair_free","constructor","proving_key","ptr1","keypair_new","provingKey","keypair_provingKey","verifyingKey","keypair_verifyingKey","MetadataFinalization","__wbg_metadata_free","Metadata","__wbg_get_metadata_name","__wbg_set_metadata_name","locator","__wbg_get_metadata_locator","__wbg_set_metadata_locator","prover","__wbg_get_metadata_prover","__wbg_set_metadata_prover","verifier","__wbg_get_metadata_verifier","__wbg_set_metadata_verifier","__wbg_get_metadata_verifyingKey","__wbg_set_metadata_verifyingKey","baseUrl","metadata_baseUrl","bond_public","metadata_bond_public","bond_validator","metadata_bond_validator","claim_unbond_public","metadata_claim_unbond_public","fee_private","metadata_fee_private","fee_public","metadata_fee_public","inclusion","metadata_inclusion","join","metadata_join","set_validator_state","metadata_set_validator_state","split","metadata_split","transfer_private","metadata_transfer_private","transfer_private_to_public","metadata_transfer_private_to_public","transfer_public","metadata_transfer_public","transfer_public_as_signer","metadata_transfer_public_as_signer","transfer_public_to_private","metadata_transfer_public_to_private","unbond_public","metadata_unbond_public","OfflineQueryFinalization","__wbg_offlinequery_free","OfflineQuery","state_root","offlinequery_new","addStatePath","commitment","state_path","len1","offlinequery_addStatePath","offlinequery_toString","s","offlinequery_fromString","PrivateKeyFinalization","__wbg_privatekey_free","PrivateKey","privatekey_new","from_seed_unchecked","seed","privatekey_from_seed_unchecked","privatekey_from_string","privatekey_to_string","to_view_key","privatekey_to_view_key","to_address","privatekey_to_address","Address$1","sign","privatekey_sign","newEncrypted","secret","privatekey_newEncrypted","PrivateKeyCiphertext$1","toCiphertext","privatekey_toCiphertext","fromPrivateKeyCiphertext","ciphertext","privatekey_fromPrivateKeyCiphertext","PrivateKeyCiphertextFinalization","__wbg_privatekeyciphertext_free","PrivateKeyCiphertext","encryptPrivateKey","decryptToPrivateKey","privatekeyciphertext_decryptToPrivateKey","privatekeyciphertext_toString","privatekeyciphertext_fromString","ProgramFinalization","__wbg_program_free","Program","program_fromString","program_toString","hasFunction","function_name","program_hasFunction","getFunctions","program_getFunctions","getFunctionInputs","program_getFunctionInputs","getMappings","program_getMappings","getRecordMembers","record_name","program_getRecordMembers","getStructMembers","struct_name","program_getStructMembers","getCreditsProgram","program_getCreditsProgram","id","program_id","program_address","isEqual","other","program_isEqual","getImports","program_getImports","ProgramManagerFinalization","__wbg_programmanager_free","buildDeploymentTransaction","fee_credits","fee_record","imports","fee_proving_key","fee_verifying_key","offline_query","RecordPlaintext$1","ptr2","len2","ptr3","ptr4","ptr5","OfflineQuery$1","programmanager_buildDeploymentTransaction","estimateDeploymentFee","programmanager_estimateDeploymentFee","estimateProgramNameCost","programmanager_estimateProgramNameCost","r2","BigInt","asUintN","executeFunctionOffline","_function","inputs","prove_execution","cache","len4","programmanager_executeFunctionOffline","buildExecutionTransaction","len3","ptr6","ptr7","ptr8","programmanager_buildExecutionTransaction","estimateExecutionFee","programmanager_estimateExecutionFee","estimateFinalizeFee","programmanager_estimateFinalizeFee","buildJoinTransaction","record_1","record_2","join_proving_key","join_verifying_key","programmanager_buildJoinTransaction","buildSplitTransaction","split_amount","amount_record","split_proving_key","split_verifying_key","programmanager_buildSplitTransaction","buildTransferTransaction","amount_credits","recipient","transfer_type","transfer_proving_key","transfer_verifying_key","ptr9","programmanager_buildTransferTransaction","synthesizeKeyPair","programmanager_synthesizeKeyPair","ProvingKeyFinalization","__wbg_provingkey_free","ProvingKey","isBondPublicProver","provingkey_isBondPublicProver","isBondValidatorProver","provingkey_isBondValidatorProver","isClaimUnbondPublicProver","provingkey_isClaimUnbondPublicProver","isFeePrivateProver","provingkey_isFeePrivateProver","isFeePublicProver","provingkey_isFeePublicProver","isInclusionProver","provingkey_isInclusionProver","isJoinProver","provingkey_isJoinProver","isSetValidatorStateProver","provingkey_isSetValidatorStateProver","isSplitProver","provingkey_isSplitProver","isTransferPrivateProver","provingkey_isTransferPrivateProver","isTransferPrivateToPublicProver","provingkey_isTransferPrivateToPublicProver","isTransferPublicProver","provingkey_isTransferPublicProver","isTransferPublicAsSignerProver","provingkey_isTransferPublicAsSignerProver","isTransferPublicToPrivateProver","provingkey_isTransferPublicToPrivateProver","isUnbondPublicProver","provingkey_isUnbondPublicProver","checksum","provingkey_checksum","copy","provingkey_copy","fromBytes","bytes","provingkey_fromBytes","string","provingkey_fromString","toBytes","provingkey_toBytes","v1","provingkey_toString","RecordCiphertextFinalization","__wbg_recordciphertext_free","RecordCiphertext","record","recordciphertext_fromString","recordciphertext_toString","decrypt","recordciphertext_decrypt","isOwner","recordciphertext_isOwner","RecordPlaintextFinalization","__wbg_recordplaintext_free","RecordPlaintext","recordplaintext_commitment","Field$1","recordplaintext_fromString","recordplaintext_toString","microcredits","recordplaintext_microcredits","nonce","recordplaintext_nonce","serialNumberString","deferred4_0","deferred4_1","recordplaintext_serialNumberString","r3","SignatureFinalization","__wbg_signature_free","Signature","signature_verify","signature_from_string","signature_to_string","TransactionFinalization","__wbg_transaction_free","Transaction","transaction","transaction_fromString","transaction_toString","transactionId","transaction_transactionId","transactionType","transaction_transactionType","VerifyingKeyFinalization","__wbg_verifyingkey_free","VerifyingKey","bondPublicVerifier","verifyingkey_bondPublicVerifier","bondValidatorVerifier","verifyingkey_bondValidatorVerifier","claimUnbondPublicVerifier","verifyingkey_claimUnbondPublicVerifier","feePrivateVerifier","verifyingkey_feePrivateVerifier","feePublicVerifier","verifyingkey_feePublicVerifier","inclusionVerifier","verifyingkey_inclusionVerifier","joinVerifier","verifyingkey_joinVerifier","setValidatorStateVerifier","verifyingkey_setValidatorStateVerifier","splitVerifier","verifyingkey_splitVerifier","transferPrivateVerifier","verifyingkey_transferPrivateVerifier","transferPrivateToPublicVerifier","verifyingkey_transferPrivateToPublicVerifier","transferPublicVerifier","verifyingkey_transferPublicVerifier","transferPublicAsSignerVerifier","verifyingkey_transferPublicAsSignerVerifier","transferPublicToPrivateVerifier","verifyingkey_transferPublicToPrivateVerifier","unbondPublicVerifier","verifyingkey_unbondPublicVerifier","isBondPublicVerifier","verifyingkey_isBondPublicVerifier","isBondValidatorVerifier","verifyingkey_isBondValidatorVerifier","isClaimUnbondPublicVerifier","verifyingkey_isClaimUnbondPublicVerifier","isFeePrivateVerifier","verifyingkey_isFeePrivateVerifier","isFeePublicVerifier","verifyingkey_isFeePublicVerifier","isInclusionVerifier","verifyingkey_isInclusionVerifier","isJoinVerifier","verifyingkey_isJoinVerifier","isSetValidatorStateVerifier","verifyingkey_isSetValidatorStateVerifier","isSplitVerifier","verifyingkey_isSplitVerifier","isTransferPrivateVerifier","verifyingkey_isTransferPrivateVerifier","isTransferPrivateToPublicVerifier","verifyingkey_isTransferPrivateToPublicVerifier","isTransferPublicVerifier","verifyingkey_isTransferPublicVerifier","isTransferPublicAsSignerVerifier","verifyingkey_isTransferPublicAsSignerVerifier","isTransferPublicToPrivateVerifier","verifyingkey_isTransferPublicToPrivateVerifier","isUnbondPublicVerifier","verifyingkey_isUnbondPublicVerifier","verifyingkey_checksum","verifyingkey_copy","verifyingkey_fromBytes","verifyingkey_fromString","verifyingkey_toBytes","verifyingkey_toString","ViewKeyFinalization","__wbg_viewkey_free","ViewKey","viewkey_from_string","viewkey_to_string","deferred3_0","deferred3_1","viewkey_decrypt","async","__wbg_load","Response","WebAssembly","instantiateStreaming","headers","console","warn","arrayBuffer","instantiate","Instance","__wbg_get_imports","wbg","__wbindgen_object_drop_ref","__wbg_new_71801a555ad9f2aa","XMLHttpRequest","arguments","__wbg_overrideMimeType_ee9c51919ceb418b","overrideMimeType","__wbg_open_c9eb0cf2c9d95679","arg4","arg5","open","__wbg_send_80d29985093c1ec5","send","__wbg_response_7c2e2759084f7279","response","__wbg_status_d485fb5a478426fb","status","__wbg_new_72fb9a18b5ae2624","__wbindgen_string_new","__wbg_set_1f9b04f170055d33","Reflect","__wbg_new_ab6fd82b10560829","Headers","__wbindgen_object_clone_ref","__wbg_new_0d76b0581eca6298","AbortController","__wbg_signal_a61f78a3478fd9bc","signal","__wbg_append_7bfcb4937d1d5e29","append","__wbg_instanceof_Response_849eb93e75734b6e","result","__wbg_status_61a01141acd3cf74","__wbg_url_5f6dc4009ac5f99d","__wbg_headers_9620bfada380764a","__wbg_iterator_2cee6dadfd956dfa","Symbol","iterator","__wbg_get_e3c254076557e348","__wbindgen_is_function","__wbg_call_27c0f87801dedf93","__wbindgen_is_object","__wbg_next_40fc327bfc8770e6","next","__wbg_next_196c84450b364254","__wbg_done_298b57d23c0fc80c","done","__wbg_value_d93c65011f51a456","value","__wbg_abort_2aa7521d5690750e","abort","__wbg_stringify_8887fe74e1c50d81","__wbindgen_string_get","__wbg_log_0159ca40cddf5b15","log","__wbindgen_bigint_from_u64","__wbg_call_b3ca7c6051f9bec1","__wbg_transaction_new","Transaction$1","__wbg_keypair_new","__wbindgen_module","__wbg_init","__wbindgen_wasm_module","__wbindgen_memory","__wbg_spawnWorker_f6acaddb2e29dc4a","__wbg_executionresponse_new","ExecutionResponse$1","__wbg_newwithlength_66ae46612e7f0234","__wbg_set_d4638f722068f043","__wbindgen_cb_drop","__wbg_new_16b304a2cfa7ff4a","__wbg_push_a5b05aedc7234f9f","__wbg_arrayBuffer_29931d52c7206b02","__wbg_new_63b92bc8671ed464","__wbg_length_c20a40f15020d68a","__wbg_new_81740750da40724f","state0","cb0","__wbindgen_number_new","__wbg_new_abda76e883ba8a5f","__wbg_stack_658279fe44541cf6","__wbg_error_f851667af71bcfc6","deferred0_0","deferred0_1","error","__wbg_buffer_12d079cc21e14bdb","__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb","__wbg_randomFillSync_5c9c955aa56b6049","randomFillSync","__wbg_subarray_a1f73cd4b5b42fe1","__wbg_getRandomValues_3aa56aa6edec874c","getRandomValues","__wbg_set_a47bac70306a19a7","__wbg_crypto_1d1f22824a6a080c","crypto","__wbg_process_4a72847cc503995b","process","__wbg_versions_f686565e586dd935","versions","__wbg_node_104a2ff8d6ea03a2","node","__wbindgen_is_string","__wbg_require_cca90b1a94a0255b","require","__wbg_msCrypto_eb05e62b530a1508","msCrypto","__wbg_newwithlength_e9b4878cebadb3d3","__wbg_length_cd7af8117672b8b8","__wbg_get_bd8e338fbd5f5cc8","__wbg_self_ce0dbfc45cf2f5be","self","__wbg_window_c6fb939a7f436783","window","__wbg_globalThis_d1e6af4856ba331b","globalThis","__wbg_global_207b558942527489","global","__wbindgen_is_undefined","__wbg_newnoargs_e258087cd0daa0ea","Function","__wbg_has_0af94d20077affa2","has","__wbg_fetch_bc7c8e27076a5c84","fetch","__wbg_fetch_921fad6ef9e883dd","__wbindgen_debug_string","__wbindgen_throw","__wbindgen_rethrow","__wbg_then_a73caa9a87991566","then","__wbg_then_0c86a60e8fcfe9f6","__wbg_queueMicrotask_481971b0d87f3dd4","queueMicrotask","__wbg_queueMicrotask_3cbae2ec6b6cd3d6","__wbg_resolve_b0083a7967828ec8","__wbg_waitAsync_5d743fc9058ba01a","Atomics","waitAsync","__wbg_new_8cccba86b0f574cb","__wbg_waitAsync_46d5c36955b71a79","__wbg_async_19c0400d97cc72fe","__wbg_value_571d60108110e917","__wbindgen_link_fc1eedd35dc7e0a6","encodeURIComponent","__wbg_new_d1187ae36d662ef9","__wbg_setonmessage_503809e5bb51bd33","onmessage","__wbg_of_6a70eed8d41f469c","of","__wbg_postMessage_7380d10e8b8269df","__wbg_data_3ce7c145ca4fbcdc","data","__wbg_newwithstrandinit_3fd6fba4083ff2d0","Request","__wbg_responseText_c67ed2d48db10769","responseText","__wbindgen_closure_wrapper5837","__wbindgen_closure_wrapper5862","__wbg_init_memory","maybe_memory","Memory","initial","maximum","shared","__wbg_finalize_init","exports","__wbindgen_start","initSync","Module","input","URL","freeze","__proto__","Metadata$1","ProgramManager","ProgramManager$1","RecordCiphertext$1","default","wasm_path","wasmInitThreadPool","Private","opt","importHook","serverPath","initializeHook","final_path","Cargo","threads","navigator","hardwareConcurrency","info"],"sourceRoot":""} \ No newline at end of file diff --git a/968.bundle.js b/968.bundle.js new file mode 100644 index 000000000..64f7d749b --- /dev/null +++ b/968.bundle.js @@ -0,0 +1,2 @@ +(()=>{var r,e,t,o,a,n,i={},p={};function c(r){var e=p[r];if(void 0!==e)return e.exports;var t=p[r]={exports:{}};return i[r](t,t.exports,c),t.exports}c.m=i,c.x=()=>{var r=c.O(void 0,[495,877,66],(()=>c(66)));return r=c.O(r)},r="function"==typeof Symbol?Symbol("webpack queues"):"__webpack_queues__",e="function"==typeof Symbol?Symbol("webpack exports"):"__webpack_exports__",t="function"==typeof Symbol?Symbol("webpack error"):"__webpack_error__",o=r=>{r&&r.d<1&&(r.d=1,r.forEach((r=>r.r--)),r.forEach((r=>r.r--?r.r++:r())))},c.a=(a,n,i)=>{var p;i&&((p=[]).d=-1);var c,s,f,l=new Set,u=a.exports,b=new Promise(((r,e)=>{f=e,s=r}));b[e]=u,b[r]=r=>(p&&r(p),l.forEach(r),b.catch((r=>{}))),a.exports=b,n((a=>{var n;c=(a=>a.map((a=>{if(null!==a&&"object"==typeof a){if(a[r])return a;if(a.then){var n=[];n.d=0,a.then((r=>{i[e]=r,o(n)}),(r=>{i[t]=r,o(n)}));var i={};return i[r]=r=>r(n),i}}var p={};return p[r]=r=>{},p[e]=a,p})))(a);var i=()=>c.map((r=>{if(r[t])throw r[t];return r[e]})),s=new Promise((e=>{(n=()=>e(i)).r=0;var t=r=>r!==p&&!l.has(r)&&(l.add(r),r&&!r.d&&(n.r++,r.push(n)));c.map((e=>e[r](t)))}));return n.r?s:i()}),(r=>(r?f(b[t]=r):s(u),o(p)))),p&&p.d<0&&(p.d=0)},a=[],c.O=(r,e,t,o)=>{if(!e){var n=1/0;for(f=0;f=o)&&Object.keys(c.O).every((r=>c.O[r](e[p])))?e.splice(p--,1):(i=!1,o0&&a[f-1][2]>o;f--)a[f]=a[f-1];a[f]=[e,t,o]},c.d=(r,e)=>{for(var t in e)c.o(e,t)&&!c.o(r,t)&&Object.defineProperty(r,t,{enumerable:!0,get:e[t]})},c.f={},c.e=r=>Promise.all(Object.keys(c.f).reduce(((e,t)=>(c.f[t](r,e),e)),[])),c.u=r=>r+".bundle.js",c.g=function(){if("object"==typeof globalThis)return globalThis;try{return this||new Function("return this")()}catch(r){if("object"==typeof window)return window}}(),c.o=(r,e)=>Object.prototype.hasOwnProperty.call(r,e),(()=>{var r;c.g.importScripts&&(r=c.g.location+"");var e=c.g.document;if(!r&&e&&(e.currentScript&&(r=e.currentScript.src),!r)){var t=e.getElementsByTagName("script");if(t.length)for(var o=t.length-1;o>-1&&(!r||!/^http(s?):/.test(r));)r=t[o--].src}if(!r)throw new Error("Automatic publicPath is not supported in this browser");r=r.replace(/#.*$/,"").replace(/\?.*$/,"").replace(/\/[^\/]+$/,"/"),c.p=r})(),(()=>{c.b=self.location+"";var r={968:1};c.f.i=(e,t)=>{r[e]||importScripts(c.p+c.u(e))};var e=self.webpackChunkaleo_website=self.webpackChunkaleo_website||[],t=e.push.bind(e);e.push=e=>{var[o,a,n]=e;for(var i in a)c.o(a,i)&&(c.m[i]=a[i]);for(n&&n(c);o.length;)r[o.pop()]=1;t(e)}})(),n=c.x,c.x=()=>Promise.all([495,877,66].map(c.e,c)).then(n);c.x()})(); +//# sourceMappingURL=968.bundle.js.map \ No newline at end of file diff --git a/968.bundle.js.map b/968.bundle.js.map new file mode 100644 index 000000000..5c2244e4f --- /dev/null +++ b/968.bundle.js.map @@ -0,0 +1 @@ +{"version":3,"file":"968.bundle.js","mappings":"UAAIA,EACAC,EACAC,EACAC,ECHAC,ECAAC,E,KCCAC,EAA2B,CAAC,EAGhC,SAASC,EAAoBC,GAE5B,IAAIC,EAAeH,EAAyBE,GAC5C,QAAqBE,IAAjBD,EACH,OAAOA,EAAaE,QAGrB,IAAIC,EAASN,EAAyBE,GAAY,CAGjDG,QAAS,CAAC,GAOX,OAHAE,EAAoBL,GAAUI,EAAQA,EAAOD,QAASJ,GAG/CK,EAAOD,OACf,CAGAJ,EAAoBO,EAAID,EAGxBN,EAAoBQ,EAAI,KAGvB,IAAIC,EAAsBT,EAAoBU,OAAEP,EAAW,CAAC,IAAI,IAAI,KAAK,IAAOH,EAAoB,MAEpG,OADAS,EAAsBT,EAAoBU,EAAED,EAClB,EHjCvBhB,EAAkC,mBAAXkB,OAAwBA,OAAO,kBAAoB,qBAC1EjB,EAAmC,mBAAXiB,OAAwBA,OAAO,mBAAqB,sBAC5EhB,EAAiC,mBAAXgB,OAAwBA,OAAO,iBAAmB,oBACxEf,EAAgBgB,IAChBA,GAASA,EAAMC,EAAI,IACrBD,EAAMC,EAAI,EACVD,EAAME,SAASC,GAAQA,EAAGC,MAC1BJ,EAAME,SAASC,GAAQA,EAAGC,IAAMD,EAAGC,IAAMD,MAC1C,EAyBDf,EAAoBiB,EAAI,CAACZ,EAAQa,EAAMC,KACtC,IAAIP,EACJO,KAAcP,EAAQ,IAAIC,GAAK,GAC/B,IAEIO,EACAC,EACAC,EAJAC,EAAY,IAAIC,IAChBpB,EAAUC,EAAOD,QAIjBqB,EAAU,IAAIC,SAAQ,CAACC,EAASC,KACnCN,EAASM,EACTP,EAAeM,CAAO,IAEvBF,EAAQ/B,GAAkBU,EAC1BqB,EAAQhC,GAAkBsB,IAAQH,GAASG,EAAGH,GAAQW,EAAUT,QAAQC,GAAKU,EAAe,OAAEjB,SAC9FH,EAAOD,QAAUqB,EACjBP,GAAMW,IAEL,IAAId,EADJK,EAvCa,CAACS,GAAUA,EAAKC,KAAKC,IACnC,GAAW,OAARA,GAA+B,iBAARA,EAAkB,CAC3C,GAAGA,EAAItC,GAAgB,OAAOsC,EAC9B,GAAGA,EAAIC,KAAM,CACZ,IAAIpB,EAAQ,GACZA,EAAMC,EAAI,EACVkB,EAAIC,MAAMhB,IACTiB,EAAIvC,GAAkBsB,EACtBpB,EAAagB,EAAM,IAChBsB,IACHD,EAAItC,GAAgBuC,EACpBtC,EAAagB,EAAM,IAEpB,IAAIqB,EAAM,CAAC,EAEX,OADAA,EAAIxC,GAAkBsB,GAAQA,EAAGH,GAC1BqB,CACR,CACD,CACA,IAAIE,EAAM,CAAC,EAGX,OAFAA,EAAI1C,GAAiBe,MACrB2B,EAAIzC,GAAkBqC,EACfI,CAAG,IAkBKC,CAASP,GAEvB,IAAIQ,EAAY,IAAOjB,EAAYU,KAAKjB,IACvC,GAAGA,EAAElB,GAAe,MAAMkB,EAAElB,GAC5B,OAAOkB,EAAEnB,EAAe,IAErB+B,EAAU,IAAIC,SAASC,KAC1BZ,EAAK,IAAOY,EAAQU,IACjBrB,EAAI,EACP,IAAIsB,EAAWC,GAAOA,IAAM3B,IAAUW,EAAUiB,IAAID,KAAOhB,EAAUkB,IAAIF,GAAIA,IAAMA,EAAE1B,IAAME,EAAGC,IAAKuB,EAAEG,KAAK3B,KAC1GK,EAAYU,KAAKC,GAASA,EAAItC,GAAe6C,IAAU,IAExD,OAAOvB,EAAGC,EAAIS,EAAUY,GAAW,IAChCM,IAAUA,EAAMrB,EAAOG,EAAQ9B,GAAgBgD,GAAOtB,EAAajB,GAAWR,EAAagB,MAC/FA,GAASA,EAAMC,EAAI,IAAMD,EAAMC,EAAI,EAAE,EC/DlChB,EAAW,GACfG,EAAoBU,EAAI,CAACkC,EAAQC,EAAU9B,EAAI+B,KAC9C,IAAGD,EAAH,CAMA,IAAIE,EAAeC,IACnB,IAASC,EAAI,EAAGA,EAAIpD,EAASqD,OAAQD,IAAK,CAGzC,IAFA,IAAKJ,EAAU9B,EAAI+B,GAAYjD,EAASoD,GACpCE,GAAY,EACPC,EAAI,EAAGA,EAAIP,EAASK,OAAQE,MACpB,EAAXN,GAAsBC,GAAgBD,IAAaO,OAAOC,KAAKtD,EAAoBU,GAAG6C,OAAOC,GAASxD,EAAoBU,EAAE8C,GAAKX,EAASO,MAC9IP,EAASY,OAAOL,IAAK,IAErBD,GAAY,EACTL,EAAWC,IAAcA,EAAeD,IAG7C,GAAGK,EAAW,CACbtD,EAAS4D,OAAOR,IAAK,GACrB,IAAIjC,EAAID,SACEZ,IAANa,IAAiB4B,EAAS5B,EAC/B,CACD,CACA,OAAO4B,CAnBP,CAJCE,EAAWA,GAAY,EACvB,IAAI,IAAIG,EAAIpD,EAASqD,OAAQD,EAAI,GAAKpD,EAASoD,EAAI,GAAG,GAAKH,EAAUG,IAAKpD,EAASoD,GAAKpD,EAASoD,EAAI,GACrGpD,EAASoD,GAAK,CAACJ,EAAU9B,EAAI+B,EAqBjB,EGzBd9C,EAAoBa,EAAI,CAACT,EAASsD,KACjC,IAAI,IAAIF,KAAOE,EACX1D,EAAoB2D,EAAED,EAAYF,KAASxD,EAAoB2D,EAAEvD,EAASoD,IAC5EH,OAAOO,eAAexD,EAASoD,EAAK,CAAEK,YAAY,EAAMC,IAAKJ,EAAWF,IAE1E,ECNDxD,EAAoB+D,EAAI,CAAC,EAGzB/D,EAAoBkC,EAAK8B,GACjBtC,QAAQuC,IAAIZ,OAAOC,KAAKtD,EAAoB+D,GAAGG,QAAO,CAACC,EAAUX,KACvExD,EAAoB+D,EAAEP,GAAKQ,EAASG,GAC7BA,IACL,KCNJnE,EAAoBoE,EAAKJ,GAEZA,EAAU,aCHvBhE,EAAoBqE,EAAI,WACvB,GAA0B,iBAAfC,WAAyB,OAAOA,WAC3C,IACC,OAAOC,MAAQ,IAAIC,SAAS,cAAb,EAChB,CAAE,MAAOtC,GACR,GAAsB,iBAAXuC,OAAqB,OAAOA,MACxC,CACA,CAPuB,GCAxBzE,EAAoB2D,EAAI,CAAC1B,EAAKyC,IAAUrB,OAAOsB,UAAUC,eAAeC,KAAK5C,EAAKyC,G,MCAlF,IAAII,EACA9E,EAAoBqE,EAAEU,gBAAeD,EAAY9E,EAAoBqE,EAAEW,SAAW,IACtF,IAAIC,EAAWjF,EAAoBqE,EAAEY,SACrC,IAAKH,GAAaG,IACbA,EAASC,gBACZJ,EAAYG,EAASC,cAAcC,MAC/BL,GAAW,CACf,IAAIM,EAAUH,EAASI,qBAAqB,UAC5C,GAAGD,EAAQlC,OAEV,IADA,IAAID,EAAImC,EAAQlC,OAAS,EAClBD,GAAK,KAAO6B,IAAc,aAAaQ,KAAKR,KAAaA,EAAYM,EAAQnC,KAAKkC,GAE3F,CAID,IAAKL,EAAW,MAAM,IAAIS,MAAM,yDAChCT,EAAYA,EAAUU,QAAQ,OAAQ,IAAIA,QAAQ,QAAS,IAAIA,QAAQ,YAAa,KACpFxF,EAAoByF,EAAIX,C,WClBxB9E,EAAoB0F,EAAIC,KAAKX,SAAW,GAIxC,IAAIY,EAAkB,CACrB,IAAK,GAgBN5F,EAAoB+D,EAAEd,EAAI,CAACe,EAASG,KAE/ByB,EAAgB5B,IAElBe,cAAc/E,EAAoByF,EAAIzF,EAAoBoE,EAAEJ,GAE9D,EAGD,IAAI6B,EAAqBF,KAA+B,yBAAIA,KAA+B,0BAAK,GAC5FG,EAA6BD,EAAmBnD,KAAKqD,KAAKF,GAC9DA,EAAmBnD,KAvBCsD,IACnB,IAAKnD,EAAUoD,EAAaC,GAAWF,EACvC,IAAI,IAAI/F,KAAYgG,EAChBjG,EAAoB2D,EAAEsC,EAAahG,KACrCD,EAAoBO,EAAEN,GAAYgG,EAAYhG,IAIhD,IADGiG,GAASA,EAAQlG,GACd6C,EAASK,QACd0C,EAAgB/C,EAASsD,OAAS,EACnCL,EAA2BE,EAAK,C,KRnB7BlG,EAAOE,EAAoBQ,EAC/BR,EAAoBQ,EAAI,IAChBkB,QAAQuC,IAAI,CAAC,IAAI,IAAI,IAAInC,IAAI9B,EAAoBkC,EAAGlC,IAAsBgC,KAAKlC,GSD7DE,EAAoBQ,G","sources":["webpack://aleo-website/webpack/runtime/async module","webpack://aleo-website/webpack/runtime/chunk loaded","webpack://aleo-website/webpack/runtime/startup chunk dependencies","webpack://aleo-website/webpack/bootstrap","webpack://aleo-website/webpack/runtime/define property getters","webpack://aleo-website/webpack/runtime/ensure chunk","webpack://aleo-website/webpack/runtime/get javascript chunk filename","webpack://aleo-website/webpack/runtime/global","webpack://aleo-website/webpack/runtime/hasOwnProperty shorthand","webpack://aleo-website/webpack/runtime/publicPath","webpack://aleo-website/webpack/runtime/importScripts chunk loading","webpack://aleo-website/webpack/startup"],"sourcesContent":["var webpackQueues = typeof Symbol === \"function\" ? Symbol(\"webpack queues\") : \"__webpack_queues__\";\nvar webpackExports = typeof Symbol === \"function\" ? Symbol(\"webpack exports\") : \"__webpack_exports__\";\nvar webpackError = typeof Symbol === \"function\" ? Symbol(\"webpack error\") : \"__webpack_error__\";\nvar resolveQueue = (queue) => {\n\tif(queue && queue.d < 1) {\n\t\tqueue.d = 1;\n\t\tqueue.forEach((fn) => (fn.r--));\n\t\tqueue.forEach((fn) => (fn.r-- ? fn.r++ : fn()));\n\t}\n}\nvar wrapDeps = (deps) => (deps.map((dep) => {\n\tif(dep !== null && typeof dep === \"object\") {\n\t\tif(dep[webpackQueues]) return dep;\n\t\tif(dep.then) {\n\t\t\tvar queue = [];\n\t\t\tqueue.d = 0;\n\t\t\tdep.then((r) => {\n\t\t\t\tobj[webpackExports] = r;\n\t\t\t\tresolveQueue(queue);\n\t\t\t}, (e) => {\n\t\t\t\tobj[webpackError] = e;\n\t\t\t\tresolveQueue(queue);\n\t\t\t});\n\t\t\tvar obj = {};\n\t\t\tobj[webpackQueues] = (fn) => (fn(queue));\n\t\t\treturn obj;\n\t\t}\n\t}\n\tvar ret = {};\n\tret[webpackQueues] = x => {};\n\tret[webpackExports] = dep;\n\treturn ret;\n}));\n__webpack_require__.a = (module, body, hasAwait) => {\n\tvar queue;\n\thasAwait && ((queue = []).d = -1);\n\tvar depQueues = new Set();\n\tvar exports = module.exports;\n\tvar currentDeps;\n\tvar outerResolve;\n\tvar reject;\n\tvar promise = new Promise((resolve, rej) => {\n\t\treject = rej;\n\t\touterResolve = resolve;\n\t});\n\tpromise[webpackExports] = exports;\n\tpromise[webpackQueues] = (fn) => (queue && fn(queue), depQueues.forEach(fn), promise[\"catch\"](x => {}));\n\tmodule.exports = promise;\n\tbody((deps) => {\n\t\tcurrentDeps = wrapDeps(deps);\n\t\tvar fn;\n\t\tvar getResult = () => (currentDeps.map((d) => {\n\t\t\tif(d[webpackError]) throw d[webpackError];\n\t\t\treturn d[webpackExports];\n\t\t}))\n\t\tvar promise = new Promise((resolve) => {\n\t\t\tfn = () => (resolve(getResult));\n\t\t\tfn.r = 0;\n\t\t\tvar fnQueue = (q) => (q !== queue && !depQueues.has(q) && (depQueues.add(q), q && !q.d && (fn.r++, q.push(fn))));\n\t\t\tcurrentDeps.map((dep) => (dep[webpackQueues](fnQueue)));\n\t\t});\n\t\treturn fn.r ? promise : getResult();\n\t}, (err) => ((err ? reject(promise[webpackError] = err) : outerResolve(exports)), resolveQueue(queue)));\n\tqueue && queue.d < 0 && (queue.d = 0);\n};","var deferred = [];\n__webpack_require__.O = (result, chunkIds, fn, priority) => {\n\tif(chunkIds) {\n\t\tpriority = priority || 0;\n\t\tfor(var i = deferred.length; i > 0 && deferred[i - 1][2] > priority; i--) deferred[i] = deferred[i - 1];\n\t\tdeferred[i] = [chunkIds, fn, priority];\n\t\treturn;\n\t}\n\tvar notFulfilled = Infinity;\n\tfor (var i = 0; i < deferred.length; i++) {\n\t\tvar [chunkIds, fn, priority] = deferred[i];\n\t\tvar fulfilled = true;\n\t\tfor (var j = 0; j < chunkIds.length; j++) {\n\t\t\tif ((priority & 1 === 0 || notFulfilled >= priority) && Object.keys(__webpack_require__.O).every((key) => (__webpack_require__.O[key](chunkIds[j])))) {\n\t\t\t\tchunkIds.splice(j--, 1);\n\t\t\t} else {\n\t\t\t\tfulfilled = false;\n\t\t\t\tif(priority < notFulfilled) notFulfilled = priority;\n\t\t\t}\n\t\t}\n\t\tif(fulfilled) {\n\t\t\tdeferred.splice(i--, 1)\n\t\t\tvar r = fn();\n\t\t\tif (r !== undefined) result = r;\n\t\t}\n\t}\n\treturn result;\n};","var next = __webpack_require__.x;\n__webpack_require__.x = () => {\n\treturn Promise.all([495,877,66].map(__webpack_require__.e, __webpack_require__)).then(next);\n};","// The module cache\nvar __webpack_module_cache__ = {};\n\n// The require function\nfunction __webpack_require__(moduleId) {\n\t// Check if module is in cache\n\tvar cachedModule = __webpack_module_cache__[moduleId];\n\tif (cachedModule !== undefined) {\n\t\treturn cachedModule.exports;\n\t}\n\t// Create a new module (and put it into the cache)\n\tvar module = __webpack_module_cache__[moduleId] = {\n\t\t// no module.id needed\n\t\t// no module.loaded needed\n\t\texports: {}\n\t};\n\n\t// Execute the module function\n\t__webpack_modules__[moduleId](module, module.exports, __webpack_require__);\n\n\t// Return the exports of the module\n\treturn module.exports;\n}\n\n// expose the modules object (__webpack_modules__)\n__webpack_require__.m = __webpack_modules__;\n\n// the startup function\n__webpack_require__.x = () => {\n\t// Load entry module and return exports\n\t// This entry module depends on other loaded chunks and execution need to be delayed\n\tvar __webpack_exports__ = __webpack_require__.O(undefined, [495,877,66], () => (__webpack_require__(66)))\n\t__webpack_exports__ = __webpack_require__.O(__webpack_exports__);\n\treturn __webpack_exports__;\n};\n\n","// define getter functions for harmony exports\n__webpack_require__.d = (exports, definition) => {\n\tfor(var key in definition) {\n\t\tif(__webpack_require__.o(definition, key) && !__webpack_require__.o(exports, key)) {\n\t\t\tObject.defineProperty(exports, key, { enumerable: true, get: definition[key] });\n\t\t}\n\t}\n};","__webpack_require__.f = {};\n// This file contains only the entry chunk.\n// The chunk loading function for additional chunks\n__webpack_require__.e = (chunkId) => {\n\treturn Promise.all(Object.keys(__webpack_require__.f).reduce((promises, key) => {\n\t\t__webpack_require__.f[key](chunkId, promises);\n\t\treturn promises;\n\t}, []));\n};","// This function allow to reference async chunks and sibling chunks for the entrypoint\n__webpack_require__.u = (chunkId) => {\n\t// return url for filenames based on template\n\treturn \"\" + chunkId + \".bundle.js\";\n};","__webpack_require__.g = (function() {\n\tif (typeof globalThis === 'object') return globalThis;\n\ttry {\n\t\treturn this || new Function('return this')();\n\t} catch (e) {\n\t\tif (typeof window === 'object') return window;\n\t}\n})();","__webpack_require__.o = (obj, prop) => (Object.prototype.hasOwnProperty.call(obj, prop))","var scriptUrl;\nif (__webpack_require__.g.importScripts) scriptUrl = __webpack_require__.g.location + \"\";\nvar document = __webpack_require__.g.document;\nif (!scriptUrl && document) {\n\tif (document.currentScript)\n\t\tscriptUrl = document.currentScript.src;\n\tif (!scriptUrl) {\n\t\tvar scripts = document.getElementsByTagName(\"script\");\n\t\tif(scripts.length) {\n\t\t\tvar i = scripts.length - 1;\n\t\t\twhile (i > -1 && (!scriptUrl || !/^http(s?):/.test(scriptUrl))) scriptUrl = scripts[i--].src;\n\t\t}\n\t}\n}\n// When supporting browsers where an automatic publicPath is not supported you must specify an output.publicPath manually via configuration\n// or pass an empty string (\"\") and set the __webpack_public_path__ variable from your code to use your own logic.\nif (!scriptUrl) throw new Error(\"Automatic publicPath is not supported in this browser\");\nscriptUrl = scriptUrl.replace(/#.*$/, \"\").replace(/\\?.*$/, \"\").replace(/\\/[^\\/]+$/, \"/\");\n__webpack_require__.p = scriptUrl;","__webpack_require__.b = self.location + \"\";\n\n// object to store loaded chunks\n// \"1\" means \"already loaded\"\nvar installedChunks = {\n\t968: 1\n};\n\n// importScripts chunk loading\nvar installChunk = (data) => {\n\tvar [chunkIds, moreModules, runtime] = data;\n\tfor(var moduleId in moreModules) {\n\t\tif(__webpack_require__.o(moreModules, moduleId)) {\n\t\t\t__webpack_require__.m[moduleId] = moreModules[moduleId];\n\t\t}\n\t}\n\tif(runtime) runtime(__webpack_require__);\n\twhile(chunkIds.length)\n\t\tinstalledChunks[chunkIds.pop()] = 1;\n\tparentChunkLoadingFunction(data);\n};\n__webpack_require__.f.i = (chunkId, promises) => {\n\t// \"1\" is the signal for \"already loaded\"\n\tif(!installedChunks[chunkId]) {\n\t\tif(true) { // all chunks have JS\n\t\t\timportScripts(__webpack_require__.p + __webpack_require__.u(chunkId));\n\t\t}\n\t}\n};\n\nvar chunkLoadingGlobal = self[\"webpackChunkaleo_website\"] = self[\"webpackChunkaleo_website\"] || [];\nvar parentChunkLoadingFunction = chunkLoadingGlobal.push.bind(chunkLoadingGlobal);\nchunkLoadingGlobal.push = installChunk;\n\n// no HMR\n\n// no HMR manifest","// run startup\nvar __webpack_exports__ = __webpack_require__.x();\n"],"names":["webpackQueues","webpackExports","webpackError","resolveQueue","deferred","next","__webpack_module_cache__","__webpack_require__","moduleId","cachedModule","undefined","exports","module","__webpack_modules__","m","x","__webpack_exports__","O","Symbol","queue","d","forEach","fn","r","a","body","hasAwait","currentDeps","outerResolve","reject","depQueues","Set","promise","Promise","resolve","rej","deps","map","dep","then","obj","e","ret","wrapDeps","getResult","fnQueue","q","has","add","push","err","result","chunkIds","priority","notFulfilled","Infinity","i","length","fulfilled","j","Object","keys","every","key","splice","definition","o","defineProperty","enumerable","get","f","chunkId","all","reduce","promises","u","g","globalThis","this","Function","window","prop","prototype","hasOwnProperty","call","scriptUrl","importScripts","location","document","currentScript","src","scripts","getElementsByTagName","test","Error","replace","p","b","self","installedChunks","chunkLoadingGlobal","parentChunkLoadingFunction","bind","data","moreModules","runtime","pop"],"sourceRoot":""} \ No newline at end of file diff --git a/bd1596cd75301fef51e7.js b/bd1596cd75301fef51e7.js deleted file mode 100644 index 9adde19cb..000000000 --- a/bd1596cd75301fef51e7.js +++ /dev/null @@ -1 +0,0 @@ -let _;const t=new Array(128).fill(void 0);function e(_){return t[_]}t.push(void 0,null,!0,!1);let r=t.length;function n(_){const n=e(_);return function(_){_<132||(t[_]=r,r=_)}(_),n}const i="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&i.decode();let o=null;function a(){return null!==o&&o.buffer===_.memory.buffer||(o=new Uint8Array(_.memory.buffer)),o}function s(_,t){return _>>>=0,i.decode(a().slice(_,_+t))}function c(_){r===t.length&&t.push(t.length+1);const e=r;return r=t[e],t[e]=_,e}let g=0;const w="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},d=function(_,t){const e=w.encode(_);return t.set(e),{read:_.length,written:e.length}};function b(_,t,e){if(void 0===e){const e=w.encode(_),r=t(e.length,1)>>>0;return a().subarray(r,r+e.length).set(e),g=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=a();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=a().subarray(n+o,n+r);o+=d(_,t).written,n=e(n,r,o,1)>>>0}return g=o,n}function l(_){return null==_}let u=null;function f(){return null!==u&&u.buffer===_.memory.buffer||(u=new Int32Array(_.memory.buffer)),u}function p(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=p(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>{_.__wbindgen_export_3.get(t.dtor)(t.a,t.b)}));function m(t,e,r,n){const i={a:t,b:e,cnt:1,dtor:r},o=(...t)=>{i.cnt++;const e=i.a;i.a=0;try{return n(e,i.b,...t)}finally{0==--i.cnt?(_.__wbindgen_export_3.get(i.dtor)(e,i.b),y.unregister(i)):i.a=e}};return o.original=i,y.register(o,i,i),o}function h(t,e,r){_._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h4428289ce4d5afd9(t,e,c(r))}function v(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function k(_,t){const e=t(1*_.length,1)>>>0;return a().set(_,e/1),g=_.length,e}let P=null;function S(){return null!==P&&P.buffer===_.memory.buffer||(P=new BigInt64Array(_.memory.buffer)),P}function V(_,t){return _>>>=0,a().subarray(_/1,_/1+t)}function x(t,e){try{return t.apply(this,e)}catch(t){_.__wbindgen_exn_store(c(t))}}const F="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_address_free(t>>>0)));class T{static __wrap(_){_>>>=0;const t=Object.create(T.prototype);return t.__wbg_ptr=_,F.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,F.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_address_free(t)}static from_private_key(t){v(t,W);const e=_.address_from_private_key(t.__wbg_ptr);return T.__wrap(e)}static from_view_key(t){v(t,a_);const e=_.address_from_view_key(t.__wbg_ptr);return T.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.address_from_string(e,r);return T.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.address_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}verify(t,e){const r=k(t,_.__wbindgen_malloc),n=g;v(e,t_);return 0!==_.address_verify(this.__wbg_ptr,r,n,e.__wbg_ptr)}}const R="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_execution_free(t>>>0)));class z{static __wrap(_){_>>>=0;const t=Object.create(z.prototype);return t.__wbg_ptr=_,R.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,R.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_execution_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.execution_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.execution_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const A="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_executionresponse_free(t>>>0)));class O{static __wrap(_){_>>>=0;const t=Object.create(O.prototype);return t.__wbg_ptr=_,A.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,A.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_executionresponse_free(t)}getOutputs(){return n(_.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const t=_.executionresponse_getExecution(this.__wbg_ptr);return 0===t?void 0:z.__wrap(t)}getKeys(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getKeys(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return E.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const t=_.executionresponse_getProvingKey(this.__wbg_ptr);return 0===t?void 0:Q.__wrap(t)}getVerifyingKey(){const t=_.executionresponse_getVerifyingKey(this.__wbg_ptr);return i_.__wrap(t)}getFunctionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}getProgram(){const t=_.executionresponse_getProgram(this.__wbg_ptr);return J.__wrap(t)}}const j="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_field_free(t>>>0)));class K{static __wrap(_){_>>>=0;const t=Object.create(K.prototype);return t.__wbg_ptr=_,j.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,j.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_field_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.field_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.field_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return K.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const M="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_keypair_free(t>>>0)));class E{static __wrap(_){_>>>=0;const t=Object.create(E.prototype);return t.__wbg_ptr=_,M.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,M.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_keypair_free(t)}constructor(t,e){v(t,Q);var r=t.__destroy_into_raw();v(e,i_);var n=e.__destroy_into_raw();const i=_.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_provingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return Q.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_verifyingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return i_.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_metadata_free(t>>>0)));class I{static __wrap(_){_>>>=0;const t=Object.create(I.prototype);return t.__wbg_ptr=_,B.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_metadata_free(t)}get locator(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set locator(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_locator(this.__wbg_ptr,e,r)}get prover(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set prover(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_prover(this.__wbg_ptr,e,r)}get verifier(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifier(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifier(this.__wbg_ptr,e,r)}get verifyingKey(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifyingKey(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,e,r)}static baseUrl(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.metadata_baseUrl(i);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static bond_public(){const t=_.metadata_bond_public();return I.__wrap(t)}static bond_validator(){const t=_.metadata_bond_validator();return I.__wrap(t)}static claim_unbond_public(){const t=_.metadata_claim_unbond_public();return I.__wrap(t)}static fee_private(){const t=_.metadata_fee_private();return I.__wrap(t)}static fee_public(){const t=_.metadata_fee_public();return I.__wrap(t)}static inclusion(){const t=_.metadata_inclusion();return I.__wrap(t)}static join(){const t=_.metadata_join();return I.__wrap(t)}static set_validator_state(){const t=_.metadata_set_validator_state();return I.__wrap(t)}static split(){const t=_.metadata_split();return I.__wrap(t)}static transfer_private(){const t=_.metadata_transfer_private();return I.__wrap(t)}static transfer_private_to_public(){const t=_.metadata_transfer_private_to_public();return I.__wrap(t)}static transfer_public(){const t=_.metadata_transfer_public();return I.__wrap(t)}static transfer_public_as_signer(){const t=_.metadata_transfer_public_as_signer();return I.__wrap(t)}static transfer_public_to_private(){const t=_.metadata_transfer_public_to_private();return I.__wrap(t)}static unbond_public(){const t=_.metadata_unbond_public();return I.__wrap(t)}}const U="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_offlinequery_free(t>>>0)));class C{static __wrap(_){_>>>=0;const t=Object.create(C.prototype);return t.__wbg_ptr=_,U.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,U.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_offlinequery_free(t)}constructor(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_new(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return this.__wbg_ptr=e>>>0,this}finally{_.__wbindgen_add_to_stack_pointer(16)}}addStatePath(t,e){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g,s=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),c=g;_.offlinequery_addStatePath(i,this.__wbg_ptr,o,a,s,c);var r=f()[i/4+0];if(f()[i/4+1])throw n(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.offlinequery_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return C.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekey_free(t>>>0)));class W{static __wrap(_){_>>>=0;const t=Object.create(W.prototype);return t.__wbg_ptr=_,q.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,q.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekey_free(t)}constructor(){const t=_.privatekey_new();return this.__wbg_ptr=t>>>0,this}static from_seed_unchecked(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_from_seed_unchecked(e,r);return W.__wrap(n)}static from_string(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_from_string(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_view_key(){const t=_.privatekey_to_view_key(this.__wbg_ptr);return a_.__wrap(t)}to_address(){const t=_.privatekey_to_address(this.__wbg_ptr);return T.__wrap(t)}sign(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_sign(this.__wbg_ptr,e,r);return t_.__wrap(n)}static newEncrypted(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_newEncrypted(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_toCiphertext(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,$);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_fromPrivateKeyCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return W.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekeyciphertext_free(t>>>0)));class ${static __wrap(_){_>>>=0;const t=Object.create($.prototype);return t.__wbg_ptr=_,N.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,N.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekeyciphertext_free(t)}static encryptPrivateKey(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_toCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return $.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_decryptToPrivateKey(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_program_free(t>>>0)));class J{static __wrap(_){_>>>=0;const t=Object.create(J.prototype);return t.__wbg_ptr=_,D.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_program_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return J.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}hasFunction(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;return 0!==_.program_hasFunction(this.__wbg_ptr,e,r)}getFunctions(){return n(_.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getFunctionInputs(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_getMappings(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return n(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getRecordMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getStructMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=_.program_getCreditsProgram();return J.__wrap(t)}id(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_id(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}address(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_address(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return T.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){v(t,J);return 0!==_.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return n(_.program_getImports(this.__wbg_ptr))}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_programmanager_free(t>>>0)));const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_provingkey_free(t>>>0)));class Q{static __wrap(_){_>>>=0;const t=Object.create(Q.prototype);return t.__wbg_ptr=_,L.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_provingkey_free(t)}isBondPublicProver(){return 0!==_.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==_.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==_.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==_.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==_.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==_.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==_.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==_.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==_.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==_.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==_.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==_.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==_.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==_.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==_.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.provingkey_copy(this.__wbg_ptr);return Q.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.provingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.provingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const X="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordciphertext_free(t>>>0)));class G{static __wrap(_){_>>>=0;const t=Object.create(G.prototype);return t.__wbg_ptr=_,X.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,X.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordciphertext_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return G.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}decrypt(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16);v(t,a_),_.recordciphertext_decrypt(i,this.__wbg_ptr,t.__wbg_ptr);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isOwner(t){v(t,a_);return 0!==_.recordciphertext_isOwner(this.__wbg_ptr,t.__wbg_ptr)}}const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordplaintext_free(t>>>0)));class Z{static __wrap(_){_>>>=0;const t=Object.create(Z.prototype);return t.__wbg_ptr=_,Y.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordplaintext_free(t)}commitment(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.recordplaintext_commitment(o,this.__wbg_ptr,a,s,c,w);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return K.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordplaintext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}microcredits(){const t=_.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,t)}nonce(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_nonce(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}serialNumberString(t,e,r){let i,o;try{const p=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const y=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;_.recordplaintext_serialNumberString(p,this.__wbg_ptr,t.__wbg_ptr,y,m,h,k);var a=f()[p/4+0],c=f()[p/4+1],w=f()[p/4+2],d=f()[p/4+3],l=a,u=c;if(d)throw l=0,u=0,n(w);return i=l,o=u,s(l,u)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(i,o,1)}}}const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_signature_free(t>>>0)));class t_{static __wrap(_){_>>>=0;const t=Object.create(t_.prototype);return t.__wbg_ptr=_,__.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_signature_free(t)}static sign(t,e){v(t,W);const r=k(e,_.__wbindgen_malloc),n=g,i=_.privatekey_sign(t.__wbg_ptr,r,n);return t_.__wrap(i)}verify(t,e){v(t,T);const r=k(e,_.__wbindgen_malloc),n=g;return 0!==_.signature_verify(this.__wbg_ptr,t.__wbg_ptr,r,n)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.signature_from_string(e,r);return t_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.signature_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_transaction_free(t>>>0)));class r_{static __wrap(_){_>>>=0;const t=Object.create(r_.prototype);return t.__wbg_ptr=_,e_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_transaction_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.transaction_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return r_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionType(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionType(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_verifyingkey_free(t>>>0)));class i_{static __wrap(_){_>>>=0;const t=Object.create(i_.prototype);return t.__wbg_ptr=_,n_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_verifyingkey_free(t)}static bondPublicVerifier(){const t=_.verifyingkey_bondPublicVerifier();return i_.__wrap(t)}static bondValidatorVerifier(){const t=_.verifyingkey_bondValidatorVerifier();return i_.__wrap(t)}static claimUnbondPublicVerifier(){const t=_.verifyingkey_claimUnbondPublicVerifier();return i_.__wrap(t)}static feePrivateVerifier(){const t=_.verifyingkey_feePrivateVerifier();return i_.__wrap(t)}static feePublicVerifier(){const t=_.verifyingkey_feePublicVerifier();return i_.__wrap(t)}static inclusionVerifier(){const t=_.verifyingkey_inclusionVerifier();return i_.__wrap(t)}static joinVerifier(){const t=_.verifyingkey_joinVerifier();return i_.__wrap(t)}static setValidatorStateVerifier(){const t=_.verifyingkey_setValidatorStateVerifier();return i_.__wrap(t)}static splitVerifier(){const t=_.verifyingkey_splitVerifier();return i_.__wrap(t)}static transferPrivateVerifier(){const t=_.verifyingkey_transferPrivateVerifier();return i_.__wrap(t)}static transferPrivateToPublicVerifier(){const t=_.verifyingkey_transferPrivateToPublicVerifier();return i_.__wrap(t)}static transferPublicVerifier(){const t=_.verifyingkey_transferPublicVerifier();return i_.__wrap(t)}static transferPublicAsSignerVerifier(){const t=_.verifyingkey_transferPublicAsSignerVerifier();return i_.__wrap(t)}static transferPublicToPrivateVerifier(){const t=_.verifyingkey_transferPublicToPrivateVerifier();return i_.__wrap(t)}static unbondPublicVerifier(){const t=_.verifyingkey_unbondPublicVerifier();return i_.__wrap(t)}isBondPublicVerifier(){return 0!==_.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==_.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==_.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==_.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==_.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==_.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==_.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==_.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==_.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==_.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==_.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==_.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==_.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==_.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==_.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.verifyingkey_copy(this.__wbg_ptr);return i_.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.verifyingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.verifyingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_viewkey_free(t>>>0)));class a_{static __wrap(_){_>>>=0;const t=Object.create(a_.prototype);return t.__wbg_ptr=_,o_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_viewkey_free(t)}static from_private_key(t){v(t,W);const e=_.privatekey_to_view_key(t.__wbg_ptr);return a_.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.viewkey_from_string(e,r);return a_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.viewkey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_address(){const t=_.address_from_view_key(this.__wbg_ptr);return T.__wrap(t)}decrypt(t){let e,r;try{const l=_.__wbindgen_add_to_stack_pointer(-16),u=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),p=g;_.viewkey_decrypt(l,this.__wbg_ptr,u,p);var i=f()[l/4+0],o=f()[l/4+1],a=f()[l/4+2],c=f()[l/4+3],w=i,d=o;if(c)throw w=0,d=0,n(a);return e=w,r=d,s(w,d)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(e,r,1)}}}function s_(){const t={wbg:{}};return t.wbg.__wbindgen_object_drop_ref=function(_){n(_)},t.wbg.__wbg_new_71801a555ad9f2aa=function(){return x((function(){return c(new XMLHttpRequest)}),arguments)},t.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return x((function(_,t,r){e(_).overrideMimeType(s(t,r))}),arguments)},t.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return x((function(_,t,r,n,i,o){e(_).open(s(t,r),s(n,i),0!==o)}),arguments)},t.wbg.__wbg_send_80d29985093c1ec5=function(){return x((function(_){e(_).send()}),arguments)},t.wbg.__wbg_response_7c2e2759084f7279=function(){return x((function(_){return c(e(_).response)}),arguments)},t.wbg.__wbg_status_d485fb5a478426fb=function(){return x((function(_){return e(_).status}),arguments)},t.wbg.__wbg_new_72fb9a18b5ae2624=function(){return c(new Object)},t.wbg.__wbindgen_string_new=function(_,t){return c(s(_,t))},t.wbg.__wbg_set_1f9b04f170055d33=function(){return x((function(_,t,r){return Reflect.set(e(_),e(t),e(r))}),arguments)},t.wbg.__wbg_new_ab6fd82b10560829=function(){return x((function(){return c(new Headers)}),arguments)},t.wbg.__wbindgen_object_clone_ref=function(_){return c(e(_))},t.wbg.__wbg_new_0d76b0581eca6298=function(){return x((function(){return c(new AbortController)}),arguments)},t.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return c(e(_).signal)},t.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return x((function(_,t,r,n,i){e(_).append(s(t,r),s(n,i))}),arguments)},t.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=e(_)instanceof Response}catch(_){t=!1}return t},t.wbg.__wbg_status_61a01141acd3cf74=function(_){return e(_).status},t.wbg.__wbg_url_5f6dc4009ac5f99d=function(t,r){const n=b(e(r).url,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_headers_9620bfada380764a=function(_){return c(e(_).headers)},t.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return c(Symbol.iterator)},t.wbg.__wbg_get_e3c254076557e348=function(){return x((function(_,t){return c(Reflect.get(e(_),e(t)))}),arguments)},t.wbg.__wbindgen_is_function=function(_){return"function"==typeof e(_)},t.wbg.__wbg_call_27c0f87801dedf93=function(){return x((function(_,t){return c(e(_).call(e(t)))}),arguments)},t.wbg.__wbindgen_is_object=function(_){const t=e(_);return"object"==typeof t&&null!==t},t.wbg.__wbg_next_40fc327bfc8770e6=function(_){return c(e(_).next)},t.wbg.__wbg_next_196c84450b364254=function(){return x((function(_){return c(e(_).next())}),arguments)},t.wbg.__wbg_done_298b57d23c0fc80c=function(_){return e(_).done},t.wbg.__wbg_value_d93c65011f51a456=function(_){return c(e(_).value)},t.wbg.__wbg_abort_2aa7521d5690750e=function(_){e(_).abort()},t.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return x((function(_){return c(JSON.stringify(e(_)))}),arguments)},t.wbg.__wbindgen_string_get=function(t,r){const n=e(r),i="string"==typeof n?n:void 0;var o=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;f()[t/4+1]=a,f()[t/4+0]=o},t.wbg.__wbg_transaction_new=function(_){return c(r_.__wrap(_))},t.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return x((function(_,t,r){return c(e(_).call(e(t),e(r)))}),arguments)},t.wbg.__wbg_keypair_new=function(_){return c(E.__wrap(_))},t.wbg.__wbindgen_bigint_from_u64=function(_){return c(BigInt.asUintN(64,_))},t.wbg.__wbindgen_module=function(){return c(w_.__wbindgen_wasm_module)},t.wbg.__wbindgen_memory=function(){return c(_.memory)},t.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,r,n){return c(function(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}(e(_),e(t),e(r),n>>>0))},t.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(s(_,t))},t.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return c(new Array(_>>>0))},t.wbg.__wbg_set_d4638f722068f043=function(_,t,r){e(_)[t>>>0]=n(r)},t.wbg.__wbg_executionresponse_new=function(_){return c(O.__wrap(_))},t.wbg.__wbindgen_cb_drop=function(_){const t=n(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},t.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return c(new Array)},t.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return e(_).push(e(t))},t.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return x((function(_){return c(e(_).arrayBuffer())}),arguments)},t.wbg.__wbg_new_63b92bc8671ed464=function(_){return c(new Uint8Array(e(_)))},t.wbg.__wbg_length_c20a40f15020d68a=function(_){return e(_).length},t.wbg.__wbg_new_81740750da40724f=function(t,e){try{var r={a:t,b:e};const n=new Promise(((t,e)=>{const n=r.a;r.a=0;try{return function(t,e,r,n){_.wasm_bindgen__convert__closures__invoke2_mut__h2157eed66e6e3fca(t,e,c(r),c(n))}(n,r.b,t,e)}finally{r.a=n}}));return c(n)}finally{r.a=r.b=0}},t.wbg.__wbindgen_number_new=function(_){return c(_)},t.wbg.__wbg_new_abda76e883ba8a5f=function(){return c(new Error)},t.wbg.__wbg_stack_658279fe44541cf6=function(t,r){const n=b(e(r).stack,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_error_f851667af71bcfc6=function(t,e){let r,n;try{r=t,n=e,console.error(s(t,e))}finally{_.__wbindgen_free(r,n,1)}},t.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return c(e(_).buffer)},t.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,r){return c(new Uint8Array(e(_),t>>>0,r>>>0))},t.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return x((function(_,t){e(_).randomFillSync(n(t))}),arguments)},t.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,r){return c(e(_).subarray(t>>>0,r>>>0))},t.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return x((function(_,t){e(_).getRandomValues(e(t))}),arguments)},t.wbg.__wbg_set_a47bac70306a19a7=function(_,t,r){e(_).set(e(t),r>>>0)},t.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return c(e(_).crypto)},t.wbg.__wbg_process_4a72847cc503995b=function(_){return c(e(_).process)},t.wbg.__wbg_versions_f686565e586dd935=function(_){return c(e(_).versions)},t.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return c(e(_).node)},t.wbg.__wbindgen_is_string=function(_){return"string"==typeof e(_)},t.wbg.__wbg_require_cca90b1a94a0255b=function(){return x((function(){return c(module.require)}),arguments)},t.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return c(e(_).msCrypto)},t.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return c(new Uint8Array(_>>>0))},t.wbg.__wbg_length_cd7af8117672b8b8=function(_){return e(_).length},t.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return c(e(_)[t>>>0])},t.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return x((function(){return c(self.self)}),arguments)},t.wbg.__wbg_window_c6fb939a7f436783=function(){return x((function(){return c(window.window)}),arguments)},t.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return x((function(){return c(globalThis.globalThis)}),arguments)},t.wbg.__wbg_global_207b558942527489=function(){return x((function(){return c(global.global)}),arguments)},t.wbg.__wbindgen_is_undefined=function(_){return void 0===e(_)},t.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return c(new Function(s(_,t)))},t.wbg.__wbg_has_0af94d20077affa2=function(){return x((function(_,t){return Reflect.has(e(_),e(t))}),arguments)},t.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return c(fetch(e(_)))},t.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return c(e(_).fetch(e(t)))},t.wbg.__wbindgen_debug_string=function(t,r){const n=b(p(e(r)),_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbindgen_throw=function(_,t){throw new Error(s(_,t))},t.wbg.__wbindgen_rethrow=function(_){throw n(_)},t.wbg.__wbg_then_a73caa9a87991566=function(_,t,r){return c(e(_).then(e(t),e(r)))},t.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return c(e(_).then(e(t)))},t.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(e(_))},t.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return c(e(_).queueMicrotask)},t.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return c(Promise.resolve(e(_)))},t.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return c(Atomics.waitAsync)},t.wbg.__wbg_new_8cccba86b0f574cb=function(_){return c(new Int32Array(e(_)))},t.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,r){return c(Atomics.waitAsync(e(_),t,r))},t.wbg.__wbg_async_19c0400d97cc72fe=function(_){return e(_).async},t.wbg.__wbg_value_571d60108110e917=function(_){return c(e(_).value)},t.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(t){const e=b("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;f()[t/4+1]=r,f()[t/4+0]=e},t.wbg.__wbg_new_d1187ae36d662ef9=function(){return x((function(_,t){return c(new Worker(s(_,t)))}),arguments)},t.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){e(_).onmessage=e(t)},t.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,r){return c(Array.of(e(_),e(t),e(r)))},t.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return x((function(_,t){e(_).postMessage(e(t))}),arguments)},t.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return c(e(_).data)},t.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return x((function(_,t,r){return c(new Request(s(_,t),e(r)))}),arguments)},t.wbg.__wbg_responseText_c67ed2d48db10769=function(){return x((function(t,r){const n=e(r).responseText;var i=l(n)?0:b(n,_.__wbindgen_malloc,_.__wbindgen_realloc),o=g;f()[t/4+1]=o,f()[t/4+0]=i}),arguments)},t.wbg.__wbindgen_closure_wrapper5763=function(_,t,e){return c(m(_,t,538,h))},t.wbg.__wbindgen_closure_wrapper5788=function(_,t,e){return c(m(_,t,538,h))},t}function c_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function g_(t,e){return _=t.exports,w_.__wbindgen_wasm_module=e,P=null,u=null,o=null,_.__wbindgen_start(),_}async function w_(t,e){if(void 0!==_)return _;const r=s_();("string"==typeof t||"function"==typeof Request&&t instanceof Request||"function"==typeof URL&&t instanceof URL)&&(t=fetch(t)),c_(r,e);const{instance:n,module:i}=await async function(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}(await t,r);return g_(n,i)}var d_=Object.freeze({__proto__:null,Address:T,Execution:z,ExecutionResponse:O,Field:K,KeyPair:E,Metadata:I,OfflineQuery:C,PrivateKey:W,PrivateKeyCiphertext:$,Program:J,ProgramManager:class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_programmanager_free(t)}static buildDeploymentTransaction(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g;let p=0;l(i)||(v(i,Z),p=i.__destroy_into_raw());var y=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g;let h=0;l(s)||(v(s,Q),h=s.__destroy_into_raw());let k=0;l(w)||(v(w,i_),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,C),P=d.__destroy_into_raw());return n(_.programmanager_buildDeploymentTransaction(t.__wbg_ptr,u,f,r,p,y,m,l(a)?0:c(a),h,k,P))}static estimateDeploymentFee(t,e){const r=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;return n(_.programmanager_estimateDeploymentFee(r,i,l(e)?0:c(e)))}static estimateProgramNameCost(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.programmanager_estimateProgramNameCost(i,o,a);var e=S()[i/8+0],r=f()[i/4+2];if(f()[i/4+3])throw n(r);return BigInt.asUintN(64,e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(t,e,r,i,o,a,s,w,d,u,f){v(t,W);const p=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g,m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(w)||(v(w,Q),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,i_),P=d.__destroy_into_raw());var S=l(u)?0:b(u,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(f)||(v(f,C),x=f.__destroy_into_raw());return n(_.programmanager_executeFunctionOffline(t.__wbg_ptr,p,y,m,h,c(i),o,a,l(s)?0:c(s),k,P,S,V,x))}static buildExecutionTransaction(t,e,r,i,o,a,s,w,d,u,f,p,y){v(t,W);const m=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;let S=0;l(a)||(v(a,Z),S=a.__destroy_into_raw());var V=l(s)?0:b(s,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(d)||(v(d,Q),F=d.__destroy_into_raw());let T=0;l(u)||(v(u,i_),T=u.__destroy_into_raw());let R=0;l(f)||(v(f,Q),R=f.__destroy_into_raw());let z=0;l(p)||(v(p,i_),z=p.__destroy_into_raw());let A=0;l(y)||(v(y,C),A=y.__destroy_into_raw());return n(_.programmanager_buildExecutionTransaction(t.__wbg_ptr,m,h,k,P,c(i),o,S,V,x,l(w)?0:c(w),F,T,R,z,A))}static estimateExecutionFee(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g,p=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g;var m=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(w)||(v(w,i_),P=w.__destroy_into_raw());let S=0;l(d)||(v(d,C),S=d.__destroy_into_raw());return n(_.programmanager_estimateExecutionFee(t.__wbg_ptr,u,f,p,y,c(i),m,h,l(a)?0:c(a),k,P,S))}static estimateFinalizeFee(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.programmanager_estimateFinalizeFee(o,a,s,c,w);var r=S()[o/8+0],i=f()[o/4+2];if(f()[o/4+3])throw n(i);return BigInt.asUintN(64,r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(t,e,r,i,o,a,s,c,w,d,u){v(t,W),v(e,Z);var f=e.__destroy_into_raw();v(r,Z);var p=r.__destroy_into_raw();let y=0;l(o)||(v(o,Z),y=o.__destroy_into_raw());var m=l(a)?0:b(a,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(c)||(v(c,i_),P=c.__destroy_into_raw());let S=0;l(w)||(v(w,Q),S=w.__destroy_into_raw());let V=0;l(d)||(v(d,i_),V=d.__destroy_into_raw());let x=0;l(u)||(v(u,C),x=u.__destroy_into_raw());return n(_.programmanager_buildJoinTransaction(t.__wbg_ptr,f,p,i,y,m,h,k,P,S,V,x))}static buildSplitTransaction(t,e,r,i,o,a,s){v(t,W),v(r,Z);var c=r.__destroy_into_raw(),w=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;let u=0;l(o)||(v(o,Q),u=o.__destroy_into_raw());let f=0;l(a)||(v(a,i_),f=a.__destroy_into_raw());let p=0;l(s)||(v(s,C),p=s.__destroy_into_raw());return n(_.programmanager_buildSplitTransaction(t.__wbg_ptr,e,c,w,d,u,f,p))}static buildTransferTransaction(t,e,r,i,o,a,s,c,w,d,u,f,p,y){v(t,W);const m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;var S=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(a)||(v(a,Z),x=a.__destroy_into_raw());let F=0;l(c)||(v(c,Z),F=c.__destroy_into_raw());var T=l(w)?0:b(w,_.__wbindgen_malloc,_.__wbindgen_realloc),R=g;let z=0;l(d)||(v(d,Q),z=d.__destroy_into_raw());let A=0;l(u)||(v(u,i_),A=u.__destroy_into_raw());let O=0;l(f)||(v(f,Q),O=f.__destroy_into_raw());let j=0;l(p)||(v(p,i_),j=p.__destroy_into_raw());let K=0;l(y)||(v(y,C),K=y.__destroy_into_raw());return n(_.programmanager_buildTransferTransaction(t.__wbg_ptr,e,m,h,k,P,S,V,x,s,F,T,R,z,A,O,j,K))}static synthesizeKeyPair(t,e,r,i,o){v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,w=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;return n(_.programmanager_synthesizeKeyPair(t.__wbg_ptr,a,s,w,d,c(i),l(o)?0:c(o)))}},ProvingKey:Q,RecordCiphertext:G,RecordPlaintext:Z,Signature:t_,Transaction:r_,VerifyingKey:i_,ViewKey:a_,default:w_,initSync:function(t,e){if(void 0!==_)return _;const r=s_();return c_(r,e),t instanceof WebAssembly.Module||(t=new WebAssembly.Module(t)),g_(new WebAssembly.Instance(t,r),t)},initThreadPool:function(t,e){return n(_.initThreadPool(c(t),e))},runRayonThread:function(t){_.runRayonThread(t)},verifyFunctionExecution:function(t,e,r,i){try{const s=_.__wbindgen_add_to_stack_pointer(-16);v(t,z),v(e,i_),v(r,J);const c=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.verifyFunctionExecution(s,t.__wbg_ptr,e.__wbg_ptr,r.__wbg_ptr,c,w);var o=f()[s/4+0],a=f()[s/4+1];if(f()[s/4+2])throw n(a);return 0!==o}finally{_.__wbindgen_add_to_stack_pointer(16)}}});await async function(_){const[t,{module:e,memory:r,address:n}]=await Promise.all([_,new Promise((_=>{addEventListener("message",(t=>{_(t.data)}),{capture:!0,once:!0})}))]),i=await t({initializeHook:(_,t)=>_(e,r)});postMessage(null),i.runRayonThread(n),close()}((async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n="assets/aleo_wasm.wasm";return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(w_,n):await w_(n),d_})); \ No newline at end of file diff --git a/f62b366a9b5fa66a5bcc.js b/f62b366a9b5fa66a5bcc.js deleted file mode 100644 index 5597ca0ad..000000000 --- a/f62b366a9b5fa66a5bcc.js +++ /dev/null @@ -1 +0,0 @@ -let _;const t=new Array(128).fill(void 0);function e(_){return t[_]}t.push(void 0,null,!0,!1);let r=t.length;function n(_){const n=e(_);return function(_){_<132||(t[_]=r,r=_)}(_),n}const i="undefined"!=typeof TextDecoder?new TextDecoder("utf-8",{ignoreBOM:!0,fatal:!0}):{decode:()=>{throw Error("TextDecoder not available")}};"undefined"!=typeof TextDecoder&&i.decode();let o=null;function a(){return null!==o&&o.buffer===_.memory.buffer||(o=new Uint8Array(_.memory.buffer)),o}function s(_,t){return _>>>=0,i.decode(a().slice(_,_+t))}function c(_){r===t.length&&t.push(t.length+1);const e=r;return r=t[e],t[e]=_,e}let g=0;const w="undefined"!=typeof TextEncoder?new TextEncoder("utf-8"):{encode:()=>{throw Error("TextEncoder not available")}},d=function(_,t){const e=w.encode(_);return t.set(e),{read:_.length,written:e.length}};function b(_,t,e){if(void 0===e){const e=w.encode(_),r=t(e.length,1)>>>0;return a().subarray(r,r+e.length).set(e),g=e.length,r}let r=_.length,n=t(r,1)>>>0;const i=a();let o=0;for(;o127)break;i[n+o]=t}if(o!==r){0!==o&&(_=_.slice(o)),n=e(n,r,r=o+3*_.length,1)>>>0;const t=a().subarray(n+o,n+r);o+=d(_,t).written,n=e(n,r,o,1)>>>0}return g=o,n}function l(_){return null==_}let u=null;function f(){return null!==u&&u.buffer===_.memory.buffer||(u=new Int32Array(_.memory.buffer)),u}function p(_){const t=typeof _;if("number"==t||"boolean"==t||null==_)return`${_}`;if("string"==t)return`"${_}"`;if("symbol"==t){const t=_.description;return null==t?"Symbol":`Symbol(${t})`}if("function"==t){const t=_.name;return"string"==typeof t&&t.length>0?`Function(${t})`:"Function"}if(Array.isArray(_)){const t=_.length;let e="[";t>0&&(e+=p(_[0]));for(let r=1;r1))return toString.call(_);if(r=e[1],"Object"==r)try{return"Object("+JSON.stringify(_)+")"}catch(_){return"Object"}return _ instanceof Error?`${_.name}: ${_.message}\n${_.stack}`:r}const y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>{_.__wbindgen_export_3.get(t.dtor)(t.a,t.b)}));function m(t,e,r,n){const i={a:t,b:e,cnt:1,dtor:r},o=(...t)=>{i.cnt++;const e=i.a;i.a=0;try{return n(e,i.b,...t)}finally{0==--i.cnt?(_.__wbindgen_export_3.get(i.dtor)(e,i.b),y.unregister(i)):i.a=e}};return o.original=i,y.register(o,i,i),o}function h(t,e,r){_._dyn_core__ops__function__FnMut__A____Output___R_as_wasm_bindgen__closure__WasmClosure___describe__invoke__h442b5e922f6f9710(t,e,c(r))}function v(_,t){if(!(_ instanceof t))throw new Error(`expected instance of ${t.name}`);return _.ptr}function k(_,t){const e=t(1*_.length,1)>>>0;return a().set(_,e/1),g=_.length,e}let P=null;function S(){return null!==P&&P.buffer===_.memory.buffer||(P=new BigInt64Array(_.memory.buffer)),P}function V(_,t){return _>>>=0,a().subarray(_/1,_/1+t)}function x(t,e){try{return t.apply(this,e)}catch(t){_.__wbindgen_exn_store(c(t))}}const F="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_address_free(t>>>0)));class T{static __wrap(_){_>>>=0;const t=Object.create(T.prototype);return t.__wbg_ptr=_,F.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,F.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_address_free(t)}static from_private_key(t){v(t,W);const e=_.address_from_private_key(t.__wbg_ptr);return T.__wrap(e)}static from_view_key(t){v(t,a_);const e=_.address_from_view_key(t.__wbg_ptr);return T.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.address_from_string(e,r);return T.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.address_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}verify(t,e){const r=k(t,_.__wbindgen_malloc),n=g;v(e,t_);return 0!==_.address_verify(this.__wbg_ptr,r,n,e.__wbg_ptr)}}const R="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_execution_free(t>>>0)));class z{static __wrap(_){_>>>=0;const t=Object.create(z.prototype);return t.__wbg_ptr=_,R.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,R.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_execution_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.execution_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.execution_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const A="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_executionresponse_free(t>>>0)));class O{static __wrap(_){_>>>=0;const t=Object.create(O.prototype);return t.__wbg_ptr=_,A.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,A.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_executionresponse_free(t)}getOutputs(){return n(_.executionresponse_getOutputs(this.__wbg_ptr))}getExecution(){const t=_.executionresponse_getExecution(this.__wbg_ptr);return 0===t?void 0:z.__wrap(t)}getKeys(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getKeys(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return E.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getProvingKey(){const t=_.executionresponse_getProvingKey(this.__wbg_ptr);return 0===t?void 0:Q.__wrap(t)}getVerifyingKey(){const t=_.executionresponse_getVerifyingKey(this.__wbg_ptr);return i_.__wrap(t)}getFunctionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.executionresponse_getFunctionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}getProgram(){const t=_.executionresponse_getProgram(this.__wbg_ptr);return J.__wrap(t)}}const j="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_field_free(t>>>0)));class K{static __wrap(_){_>>>=0;const t=Object.create(K.prototype);return t.__wbg_ptr=_,j.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,j.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_field_free(t)}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.field_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.field_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return K.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const M="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_keypair_free(t>>>0)));class E{static __wrap(_){_>>>=0;const t=Object.create(E.prototype);return t.__wbg_ptr=_,M.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,M.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_keypair_free(t)}constructor(t,e){v(t,Q);var r=t.__destroy_into_raw();v(e,i_);var n=e.__destroy_into_raw();const i=_.keypair_new(r,n);return this.__wbg_ptr=i>>>0,this}provingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_provingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return Q.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}verifyingKey(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.keypair_verifyingKey(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return i_.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const B="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_metadata_free(t>>>0)));class I{static __wrap(_){_>>>=0;const t=Object.create(I.prototype);return t.__wbg_ptr=_,B.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,B.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_metadata_free(t)}get locator(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_locator(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set locator(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_locator(this.__wbg_ptr,e,r)}get prover(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_prover(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set prover(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_prover(this.__wbg_ptr,e,r)}get verifier(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifier(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifier(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifier(this.__wbg_ptr,e,r)}get verifyingKey(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.__wbg_get_metadata_verifyingKey(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}set verifyingKey(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;_.__wbg_set_metadata_verifyingKey(this.__wbg_ptr,e,r)}static baseUrl(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.metadata_baseUrl(i);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static bond_public(){const t=_.metadata_bond_public();return I.__wrap(t)}static bond_validator(){const t=_.metadata_bond_validator();return I.__wrap(t)}static claim_unbond_public(){const t=_.metadata_claim_unbond_public();return I.__wrap(t)}static fee_private(){const t=_.metadata_fee_private();return I.__wrap(t)}static fee_public(){const t=_.metadata_fee_public();return I.__wrap(t)}static inclusion(){const t=_.metadata_inclusion();return I.__wrap(t)}static join(){const t=_.metadata_join();return I.__wrap(t)}static set_validator_state(){const t=_.metadata_set_validator_state();return I.__wrap(t)}static split(){const t=_.metadata_split();return I.__wrap(t)}static transfer_private(){const t=_.metadata_transfer_private();return I.__wrap(t)}static transfer_private_to_public(){const t=_.metadata_transfer_private_to_public();return I.__wrap(t)}static transfer_public(){const t=_.metadata_transfer_public();return I.__wrap(t)}static transfer_public_as_signer(){const t=_.metadata_transfer_public_as_signer();return I.__wrap(t)}static transfer_public_to_private(){const t=_.metadata_transfer_public_to_private();return I.__wrap(t)}static unbond_public(){const t=_.metadata_unbond_public();return I.__wrap(t)}}const U="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_offlinequery_free(t>>>0)));class C{static __wrap(_){_>>>=0;const t=Object.create(C.prototype);return t.__wbg_ptr=_,U.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,U.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_offlinequery_free(t)}constructor(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_new(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return this.__wbg_ptr=e>>>0,this}finally{_.__wbindgen_add_to_stack_pointer(16)}}addStatePath(t,e){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g,s=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),c=g;_.offlinequery_addStatePath(i,this.__wbg_ptr,o,a,s,c);var r=f()[i/4+0];if(f()[i/4+1])throw n(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.offlinequery_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.offlinequery_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return C.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const q="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekey_free(t>>>0)));class W{static __wrap(_){_>>>=0;const t=Object.create(W.prototype);return t.__wbg_ptr=_,q.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,q.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekey_free(t)}constructor(){const t=_.privatekey_new();return this.__wbg_ptr=t>>>0,this}static from_seed_unchecked(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_from_seed_unchecked(e,r);return W.__wrap(n)}static from_string(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_from_string(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_view_key(){const t=_.privatekey_to_view_key(this.__wbg_ptr);return a_.__wrap(t)}to_address(){const t=_.privatekey_to_address(this.__wbg_ptr);return T.__wrap(t)}sign(t){const e=k(t,_.__wbindgen_malloc),r=g,n=_.privatekey_sign(this.__wbg_ptr,e,r);return t_.__wrap(n)}static newEncrypted(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_newEncrypted(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toCiphertext(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekey_toCiphertext(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromPrivateKeyCiphertext(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,$);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_fromPrivateKeyCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return W.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const N="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_privatekeyciphertext_free(t>>>0)));class ${static __wrap(_){_>>>=0;const t=Object.create($.prototype);return t.__wbg_ptr=_,N.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,N.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_privatekeyciphertext_free(t)}static encryptPrivateKey(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g;_.privatekey_toCiphertext(o,t.__wbg_ptr,a,s);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return $.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}decryptToPrivateKey(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_decryptToPrivateKey(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return W.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.privatekeyciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.privatekeyciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return $.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}}const D="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_program_free(t>>>0)));class J{static __wrap(_){_>>>=0;const t=Object.create(J.prototype);return t.__wbg_ptr=_,D.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,D.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_program_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return J.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}hasFunction(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;return 0!==_.program_hasFunction(this.__wbg_ptr,e,r)}getFunctions(){return n(_.program_getFunctions(this.__wbg_ptr))}getFunctionInputs(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getFunctionInputs(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getMappings(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_getMappings(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return n(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getRecordMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getRecordMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}getStructMembers(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.program_getStructMembers(i,this.__wbg_ptr,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return n(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static getCreditsProgram(){const t=_.program_getCreditsProgram();return J.__wrap(t)}id(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.program_id(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}address(){try{const r=_.__wbindgen_add_to_stack_pointer(-16);_.program_address(r,this.__wbg_ptr);var t=f()[r/4+0],e=f()[r/4+1];if(f()[r/4+2])throw n(e);return T.__wrap(t)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isEqual(t){v(t,J);return 0!==_.program_isEqual(this.__wbg_ptr,t.__wbg_ptr)}getImports(){return n(_.program_getImports(this.__wbg_ptr))}}const H="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_programmanager_free(t>>>0)));const L="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_provingkey_free(t>>>0)));class Q{static __wrap(_){_>>>=0;const t=Object.create(Q.prototype);return t.__wbg_ptr=_,L.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,L.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_provingkey_free(t)}isBondPublicProver(){return 0!==_.provingkey_isBondPublicProver(this.__wbg_ptr)}isBondValidatorProver(){return 0!==_.provingkey_isBondValidatorProver(this.__wbg_ptr)}isClaimUnbondPublicProver(){return 0!==_.provingkey_isClaimUnbondPublicProver(this.__wbg_ptr)}isFeePrivateProver(){return 0!==_.provingkey_isFeePrivateProver(this.__wbg_ptr)}isFeePublicProver(){return 0!==_.provingkey_isFeePublicProver(this.__wbg_ptr)}isInclusionProver(){return 0!==_.provingkey_isInclusionProver(this.__wbg_ptr)}isJoinProver(){return 0!==_.provingkey_isJoinProver(this.__wbg_ptr)}isSetValidatorStateProver(){return 0!==_.provingkey_isSetValidatorStateProver(this.__wbg_ptr)}isSplitProver(){return 0!==_.provingkey_isSplitProver(this.__wbg_ptr)}isTransferPrivateProver(){return 0!==_.provingkey_isTransferPrivateProver(this.__wbg_ptr)}isTransferPrivateToPublicProver(){return 0!==_.provingkey_isTransferPrivateToPublicProver(this.__wbg_ptr)}isTransferPublicProver(){return 0!==_.provingkey_isTransferPublicProver(this.__wbg_ptr)}isTransferPublicAsSignerProver(){return 0!==_.provingkey_isTransferPublicAsSignerProver(this.__wbg_ptr)}isTransferPublicToPrivateProver(){return 0!==_.provingkey_isTransferPublicToPrivateProver(this.__wbg_ptr)}isUnbondPublicProver(){return 0!==_.provingkey_isUnbondPublicProver(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.provingkey_copy(this.__wbg_ptr);return Q.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.provingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.provingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Q.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.provingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const X="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordciphertext_free(t>>>0)));class G{static __wrap(_){_>>>=0;const t=Object.create(G.prototype);return t.__wbg_ptr=_,X.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,X.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordciphertext_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordciphertext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return G.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordciphertext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}decrypt(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16);v(t,a_),_.recordciphertext_decrypt(i,this.__wbg_ptr,t.__wbg_ptr);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}isOwner(t){v(t,a_);return 0!==_.recordciphertext_isOwner(this.__wbg_ptr,t.__wbg_ptr)}}const Y="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_recordplaintext_free(t>>>0)));class Z{static __wrap(_){_>>>=0;const t=Object.create(Z.prototype);return t.__wbg_ptr=_,Y.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,Y.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_recordplaintext_free(t)}commitment(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.recordplaintext_commitment(o,this.__wbg_ptr,a,s,c,w);var r=f()[o/4+0],i=f()[o/4+1];if(f()[o/4+2])throw n(i);return K.__wrap(r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.recordplaintext_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return Z.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}microcredits(){const t=_.recordplaintext_microcredits(this.__wbg_ptr);return BigInt.asUintN(64,t)}nonce(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.recordplaintext_nonce(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}serialNumberString(t,e,r){let i,o;try{const p=_.__wbindgen_add_to_stack_pointer(-16);v(t,W);const y=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g,h=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),k=g;_.recordplaintext_serialNumberString(p,this.__wbg_ptr,t.__wbg_ptr,y,m,h,k);var a=f()[p/4+0],c=f()[p/4+1],w=f()[p/4+2],d=f()[p/4+3],l=a,u=c;if(d)throw l=0,u=0,n(w);return i=l,o=u,s(l,u)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(i,o,1)}}}const __="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_signature_free(t>>>0)));class t_{static __wrap(_){_>>>=0;const t=Object.create(t_.prototype);return t.__wbg_ptr=_,__.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,__.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_signature_free(t)}static sign(t,e){v(t,W);const r=k(e,_.__wbindgen_malloc),n=g,i=_.privatekey_sign(t.__wbg_ptr,r,n);return t_.__wrap(i)}verify(t,e){v(t,T);const r=k(e,_.__wbindgen_malloc),n=g;return 0!==_.signature_verify(this.__wbg_ptr,t.__wbg_ptr,r,n)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.signature_from_string(e,r);return t_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.signature_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const e_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_transaction_free(t>>>0)));class r_{static __wrap(_){_>>>=0;const t=Object.create(r_.prototype);return t.__wbg_ptr=_,e_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,e_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_transaction_free(t)}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.transaction_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return r_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionId(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionId(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}transactionType(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.transaction_transactionType(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const n_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_verifyingkey_free(t>>>0)));class i_{static __wrap(_){_>>>=0;const t=Object.create(i_.prototype);return t.__wbg_ptr=_,n_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,n_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_verifyingkey_free(t)}static bondPublicVerifier(){const t=_.verifyingkey_bondPublicVerifier();return i_.__wrap(t)}static bondValidatorVerifier(){const t=_.verifyingkey_bondValidatorVerifier();return i_.__wrap(t)}static claimUnbondPublicVerifier(){const t=_.verifyingkey_claimUnbondPublicVerifier();return i_.__wrap(t)}static feePrivateVerifier(){const t=_.verifyingkey_feePrivateVerifier();return i_.__wrap(t)}static feePublicVerifier(){const t=_.verifyingkey_feePublicVerifier();return i_.__wrap(t)}static inclusionVerifier(){const t=_.verifyingkey_inclusionVerifier();return i_.__wrap(t)}static joinVerifier(){const t=_.verifyingkey_joinVerifier();return i_.__wrap(t)}static setValidatorStateVerifier(){const t=_.verifyingkey_setValidatorStateVerifier();return i_.__wrap(t)}static splitVerifier(){const t=_.verifyingkey_splitVerifier();return i_.__wrap(t)}static transferPrivateVerifier(){const t=_.verifyingkey_transferPrivateVerifier();return i_.__wrap(t)}static transferPrivateToPublicVerifier(){const t=_.verifyingkey_transferPrivateToPublicVerifier();return i_.__wrap(t)}static transferPublicVerifier(){const t=_.verifyingkey_transferPublicVerifier();return i_.__wrap(t)}static transferPublicAsSignerVerifier(){const t=_.verifyingkey_transferPublicAsSignerVerifier();return i_.__wrap(t)}static transferPublicToPrivateVerifier(){const t=_.verifyingkey_transferPublicToPrivateVerifier();return i_.__wrap(t)}static unbondPublicVerifier(){const t=_.verifyingkey_unbondPublicVerifier();return i_.__wrap(t)}isBondPublicVerifier(){return 0!==_.verifyingkey_isBondPublicVerifier(this.__wbg_ptr)}isBondValidatorVerifier(){return 0!==_.verifyingkey_isBondValidatorVerifier(this.__wbg_ptr)}isClaimUnbondPublicVerifier(){return 0!==_.verifyingkey_isClaimUnbondPublicVerifier(this.__wbg_ptr)}isFeePrivateVerifier(){return 0!==_.verifyingkey_isFeePrivateVerifier(this.__wbg_ptr)}isFeePublicVerifier(){return 0!==_.verifyingkey_isFeePublicVerifier(this.__wbg_ptr)}isInclusionVerifier(){return 0!==_.verifyingkey_isInclusionVerifier(this.__wbg_ptr)}isJoinVerifier(){return 0!==_.verifyingkey_isJoinVerifier(this.__wbg_ptr)}isSetValidatorStateVerifier(){return 0!==_.verifyingkey_isSetValidatorStateVerifier(this.__wbg_ptr)}isSplitVerifier(){return 0!==_.verifyingkey_isSplitVerifier(this.__wbg_ptr)}isTransferPrivateVerifier(){return 0!==_.verifyingkey_isTransferPrivateVerifier(this.__wbg_ptr)}isTransferPrivateToPublicVerifier(){return 0!==_.verifyingkey_isTransferPrivateToPublicVerifier(this.__wbg_ptr)}isTransferPublicVerifier(){return 0!==_.verifyingkey_isTransferPublicVerifier(this.__wbg_ptr)}isTransferPublicAsSignerVerifier(){return 0!==_.verifyingkey_isTransferPublicAsSignerVerifier(this.__wbg_ptr)}isTransferPublicToPrivateVerifier(){return 0!==_.verifyingkey_isTransferPublicToPrivateVerifier(this.__wbg_ptr)}isUnbondPublicVerifier(){return 0!==_.verifyingkey_isUnbondPublicVerifier(this.__wbg_ptr)}checksum(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_checksum(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}copy(){const t=_.verifyingkey_copy(this.__wbg_ptr);return i_.__wrap(t)}static fromBytes(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=k(t,_.__wbindgen_malloc),a=g;_.verifyingkey_fromBytes(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static fromString(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.verifyingkey_fromString(i,o,a);var e=f()[i/4+0],r=f()[i/4+1];if(f()[i/4+2])throw n(r);return i_.__wrap(e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}toBytes(){try{const o=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toBytes(o,this.__wbg_ptr);var t=f()[o/4+0],e=f()[o/4+1],r=f()[o/4+2];if(f()[o/4+3])throw n(r);var i=V(t,e).slice();return _.__wbindgen_free(t,1*e,1),i}finally{_.__wbindgen_add_to_stack_pointer(16)}}toString(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.verifyingkey_toString(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}}const o_="undefined"==typeof FinalizationRegistry?{register:()=>{},unregister:()=>{}}:new FinalizationRegistry((t=>_.__wbg_viewkey_free(t>>>0)));class a_{static __wrap(_){_>>>=0;const t=Object.create(a_.prototype);return t.__wbg_ptr=_,o_.register(t,t.__wbg_ptr,t),t}__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,o_.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_viewkey_free(t)}static from_private_key(t){v(t,W);const e=_.privatekey_to_view_key(t.__wbg_ptr);return a_.__wrap(e)}static from_string(t){const e=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),r=g,n=_.viewkey_from_string(e,r);return a_.__wrap(n)}to_string(){let t,e;try{const i=_.__wbindgen_add_to_stack_pointer(-16);_.viewkey_to_string(i,this.__wbg_ptr);var r=f()[i/4+0],n=f()[i/4+1];return t=r,e=n,s(r,n)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(t,e,1)}}to_address(){const t=_.address_from_view_key(this.__wbg_ptr);return T.__wrap(t)}decrypt(t){let e,r;try{const l=_.__wbindgen_add_to_stack_pointer(-16),u=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),p=g;_.viewkey_decrypt(l,this.__wbg_ptr,u,p);var i=f()[l/4+0],o=f()[l/4+1],a=f()[l/4+2],c=f()[l/4+3],w=i,d=o;if(c)throw w=0,d=0,n(a);return e=w,r=d,s(w,d)}finally{_.__wbindgen_add_to_stack_pointer(16),_.__wbindgen_free(e,r,1)}}}function s_(){const t={wbg:{}};return t.wbg.__wbindgen_object_drop_ref=function(_){n(_)},t.wbg.__wbg_new_71801a555ad9f2aa=function(){return x((function(){return c(new XMLHttpRequest)}),arguments)},t.wbg.__wbg_overrideMimeType_ee9c51919ceb418b=function(){return x((function(_,t,r){e(_).overrideMimeType(s(t,r))}),arguments)},t.wbg.__wbg_open_c9eb0cf2c9d95679=function(){return x((function(_,t,r,n,i,o){e(_).open(s(t,r),s(n,i),0!==o)}),arguments)},t.wbg.__wbg_send_80d29985093c1ec5=function(){return x((function(_){e(_).send()}),arguments)},t.wbg.__wbg_response_7c2e2759084f7279=function(){return x((function(_){return c(e(_).response)}),arguments)},t.wbg.__wbg_status_d485fb5a478426fb=function(){return x((function(_){return e(_).status}),arguments)},t.wbg.__wbg_new_72fb9a18b5ae2624=function(){return c(new Object)},t.wbg.__wbindgen_string_new=function(_,t){return c(s(_,t))},t.wbg.__wbg_set_1f9b04f170055d33=function(){return x((function(_,t,r){return Reflect.set(e(_),e(t),e(r))}),arguments)},t.wbg.__wbg_new_ab6fd82b10560829=function(){return x((function(){return c(new Headers)}),arguments)},t.wbg.__wbindgen_object_clone_ref=function(_){return c(e(_))},t.wbg.__wbg_new_0d76b0581eca6298=function(){return x((function(){return c(new AbortController)}),arguments)},t.wbg.__wbg_signal_a61f78a3478fd9bc=function(_){return c(e(_).signal)},t.wbg.__wbg_append_7bfcb4937d1d5e29=function(){return x((function(_,t,r,n,i){e(_).append(s(t,r),s(n,i))}),arguments)},t.wbg.__wbg_instanceof_Response_849eb93e75734b6e=function(_){let t;try{t=e(_)instanceof Response}catch(_){t=!1}return t},t.wbg.__wbg_status_61a01141acd3cf74=function(_){return e(_).status},t.wbg.__wbg_url_5f6dc4009ac5f99d=function(t,r){const n=b(e(r).url,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_headers_9620bfada380764a=function(_){return c(e(_).headers)},t.wbg.__wbg_iterator_2cee6dadfd956dfa=function(){return c(Symbol.iterator)},t.wbg.__wbg_get_e3c254076557e348=function(){return x((function(_,t){return c(Reflect.get(e(_),e(t)))}),arguments)},t.wbg.__wbindgen_is_function=function(_){return"function"==typeof e(_)},t.wbg.__wbg_call_27c0f87801dedf93=function(){return x((function(_,t){return c(e(_).call(e(t)))}),arguments)},t.wbg.__wbindgen_is_object=function(_){const t=e(_);return"object"==typeof t&&null!==t},t.wbg.__wbg_next_40fc327bfc8770e6=function(_){return c(e(_).next)},t.wbg.__wbg_next_196c84450b364254=function(){return x((function(_){return c(e(_).next())}),arguments)},t.wbg.__wbg_done_298b57d23c0fc80c=function(_){return e(_).done},t.wbg.__wbg_value_d93c65011f51a456=function(_){return c(e(_).value)},t.wbg.__wbg_abort_2aa7521d5690750e=function(_){e(_).abort()},t.wbg.__wbg_stringify_8887fe74e1c50d81=function(){return x((function(_){return c(JSON.stringify(e(_)))}),arguments)},t.wbg.__wbindgen_string_get=function(t,r){const n=e(r),i="string"==typeof n?n:void 0;var o=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;f()[t/4+1]=a,f()[t/4+0]=o},t.wbg.__wbg_log_0159ca40cddf5b15=function(_,t){console.log(s(_,t))},t.wbg.__wbindgen_bigint_from_u64=function(_){return c(BigInt.asUintN(64,_))},t.wbg.__wbg_call_b3ca7c6051f9bec1=function(){return x((function(_,t,r){return c(e(_).call(e(t),e(r)))}),arguments)},t.wbg.__wbg_keypair_new=function(_){return c(E.__wrap(_))},t.wbg.__wbindgen_module=function(){return c(w_.__wbindgen_wasm_module)},t.wbg.__wbindgen_memory=function(){return c(_.memory)},t.wbg.__wbg_spawnWorker_f6acaddb2e29dc4a=function(_,t,r,n){return c(function(_,t,e,r){return new Promise((n=>{const i=new Worker(_,{type:"module"});i.addEventListener("message",(_=>{setTimeout((()=>{n(i),i.unref&&i.unref()}),0)}),{capture:!0,once:!0}),i.postMessage({module:t,memory:e,address:r})}))}(e(_),e(t),e(r),n>>>0))},t.wbg.__wbg_executionresponse_new=function(_){return c(O.__wrap(_))},t.wbg.__wbg_transaction_new=function(_){return c(r_.__wrap(_))},t.wbg.__wbg_newwithlength_66ae46612e7f0234=function(_){return c(new Array(_>>>0))},t.wbg.__wbg_set_d4638f722068f043=function(_,t,r){e(_)[t>>>0]=n(r)},t.wbg.__wbindgen_cb_drop=function(_){const t=n(_).original;if(1==t.cnt--)return t.a=0,!0;return!1},t.wbg.__wbg_new_16b304a2cfa7ff4a=function(){return c(new Array)},t.wbg.__wbg_push_a5b05aedc7234f9f=function(_,t){return e(_).push(e(t))},t.wbg.__wbg_arrayBuffer_29931d52c7206b02=function(){return x((function(_){return c(e(_).arrayBuffer())}),arguments)},t.wbg.__wbg_new_63b92bc8671ed464=function(_){return c(new Uint8Array(e(_)))},t.wbg.__wbg_length_c20a40f15020d68a=function(_){return e(_).length},t.wbg.__wbg_new_81740750da40724f=function(t,e){try{var r={a:t,b:e};const n=new Promise(((t,e)=>{const n=r.a;r.a=0;try{return function(t,e,r,n){_.wasm_bindgen__convert__closures__invoke2_mut__h5ab12ffe4b82d47a(t,e,c(r),c(n))}(n,r.b,t,e)}finally{r.a=n}}));return c(n)}finally{r.a=r.b=0}},t.wbg.__wbindgen_number_new=function(_){return c(_)},t.wbg.__wbg_new_abda76e883ba8a5f=function(){return c(new Error)},t.wbg.__wbg_stack_658279fe44541cf6=function(t,r){const n=b(e(r).stack,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbg_error_f851667af71bcfc6=function(t,e){let r,n;try{r=t,n=e,console.error(s(t,e))}finally{_.__wbindgen_free(r,n,1)}},t.wbg.__wbg_buffer_12d079cc21e14bdb=function(_){return c(e(_).buffer)},t.wbg.__wbg_newwithbyteoffsetandlength_aa4a17c33a06e5cb=function(_,t,r){return c(new Uint8Array(e(_),t>>>0,r>>>0))},t.wbg.__wbg_randomFillSync_5c9c955aa56b6049=function(){return x((function(_,t){e(_).randomFillSync(n(t))}),arguments)},t.wbg.__wbg_subarray_a1f73cd4b5b42fe1=function(_,t,r){return c(e(_).subarray(t>>>0,r>>>0))},t.wbg.__wbg_getRandomValues_3aa56aa6edec874c=function(){return x((function(_,t){e(_).getRandomValues(e(t))}),arguments)},t.wbg.__wbg_set_a47bac70306a19a7=function(_,t,r){e(_).set(e(t),r>>>0)},t.wbg.__wbg_crypto_1d1f22824a6a080c=function(_){return c(e(_).crypto)},t.wbg.__wbg_process_4a72847cc503995b=function(_){return c(e(_).process)},t.wbg.__wbg_versions_f686565e586dd935=function(_){return c(e(_).versions)},t.wbg.__wbg_node_104a2ff8d6ea03a2=function(_){return c(e(_).node)},t.wbg.__wbindgen_is_string=function(_){return"string"==typeof e(_)},t.wbg.__wbg_require_cca90b1a94a0255b=function(){return x((function(){return c(module.require)}),arguments)},t.wbg.__wbg_msCrypto_eb05e62b530a1508=function(_){return c(e(_).msCrypto)},t.wbg.__wbg_newwithlength_e9b4878cebadb3d3=function(_){return c(new Uint8Array(_>>>0))},t.wbg.__wbg_length_cd7af8117672b8b8=function(_){return e(_).length},t.wbg.__wbg_get_bd8e338fbd5f5cc8=function(_,t){return c(e(_)[t>>>0])},t.wbg.__wbg_self_ce0dbfc45cf2f5be=function(){return x((function(){return c(self.self)}),arguments)},t.wbg.__wbg_window_c6fb939a7f436783=function(){return x((function(){return c(window.window)}),arguments)},t.wbg.__wbg_globalThis_d1e6af4856ba331b=function(){return x((function(){return c(globalThis.globalThis)}),arguments)},t.wbg.__wbg_global_207b558942527489=function(){return x((function(){return c(global.global)}),arguments)},t.wbg.__wbindgen_is_undefined=function(_){return void 0===e(_)},t.wbg.__wbg_newnoargs_e258087cd0daa0ea=function(_,t){return c(new Function(s(_,t)))},t.wbg.__wbg_has_0af94d20077affa2=function(){return x((function(_,t){return Reflect.has(e(_),e(t))}),arguments)},t.wbg.__wbg_fetch_bc7c8e27076a5c84=function(_){return c(fetch(e(_)))},t.wbg.__wbg_fetch_921fad6ef9e883dd=function(_,t){return c(e(_).fetch(e(t)))},t.wbg.__wbindgen_debug_string=function(t,r){const n=b(p(e(r)),_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;f()[t/4+1]=i,f()[t/4+0]=n},t.wbg.__wbindgen_throw=function(_,t){throw new Error(s(_,t))},t.wbg.__wbindgen_rethrow=function(_){throw n(_)},t.wbg.__wbg_then_a73caa9a87991566=function(_,t,r){return c(e(_).then(e(t),e(r)))},t.wbg.__wbg_then_0c86a60e8fcfe9f6=function(_,t){return c(e(_).then(e(t)))},t.wbg.__wbg_queueMicrotask_481971b0d87f3dd4=function(_){queueMicrotask(e(_))},t.wbg.__wbg_queueMicrotask_3cbae2ec6b6cd3d6=function(_){return c(e(_).queueMicrotask)},t.wbg.__wbg_resolve_b0083a7967828ec8=function(_){return c(Promise.resolve(e(_)))},t.wbg.__wbg_waitAsync_5d743fc9058ba01a=function(){return c(Atomics.waitAsync)},t.wbg.__wbg_new_8cccba86b0f574cb=function(_){return c(new Int32Array(e(_)))},t.wbg.__wbg_waitAsync_46d5c36955b71a79=function(_,t,r){return c(Atomics.waitAsync(e(_),t,r))},t.wbg.__wbg_async_19c0400d97cc72fe=function(_){return e(_).async},t.wbg.__wbg_value_571d60108110e917=function(_){return c(e(_).value)},t.wbg.__wbindgen_link_fc1eedd35dc7e0a6=function(t){const e=b("data:application/javascript,"+encodeURIComponent("onmessage = function (ev) {\n let [ia, index, value] = ev.data;\n ia = new Int32Array(ia.buffer);\n let result = Atomics.wait(ia, index, value);\n postMessage(result);\n };\n "),_.__wbindgen_malloc,_.__wbindgen_realloc),r=g;f()[t/4+1]=r,f()[t/4+0]=e},t.wbg.__wbg_new_d1187ae36d662ef9=function(){return x((function(_,t){return c(new Worker(s(_,t)))}),arguments)},t.wbg.__wbg_setonmessage_503809e5bb51bd33=function(_,t){e(_).onmessage=e(t)},t.wbg.__wbg_of_6a70eed8d41f469c=function(_,t,r){return c(Array.of(e(_),e(t),e(r)))},t.wbg.__wbg_postMessage_7380d10e8b8269df=function(){return x((function(_,t){e(_).postMessage(e(t))}),arguments)},t.wbg.__wbg_data_3ce7c145ca4fbcdc=function(_){return c(e(_).data)},t.wbg.__wbg_newwithstrandinit_3fd6fba4083ff2d0=function(){return x((function(_,t,r){return c(new Request(s(_,t),e(r)))}),arguments)},t.wbg.__wbg_responseText_c67ed2d48db10769=function(){return x((function(t,r){const n=e(r).responseText;var i=l(n)?0:b(n,_.__wbindgen_malloc,_.__wbindgen_realloc),o=g;f()[t/4+1]=o,f()[t/4+0]=i}),arguments)},t.wbg.__wbindgen_closure_wrapper5763=function(_,t,e){return c(m(_,t,538,h))},t.wbg.__wbindgen_closure_wrapper5788=function(_,t,e){return c(m(_,t,538,h))},t}function c_(_,t){_.wbg.memory=t||new WebAssembly.Memory({initial:25,maximum:65536,shared:!0})}function g_(t,e){return _=t.exports,w_.__wbindgen_wasm_module=e,P=null,u=null,o=null,_.__wbindgen_start(),_}async function w_(t,e){if(void 0!==_)return _;const r=s_();("string"==typeof t||"function"==typeof Request&&t instanceof Request||"function"==typeof URL&&t instanceof URL)&&(t=fetch(t)),c_(r,e);const{instance:n,module:i}=await async function(_,t){if("function"==typeof Response&&_ instanceof Response){if("function"==typeof WebAssembly.instantiateStreaming)try{return await WebAssembly.instantiateStreaming(_,t)}catch(t){if("application/wasm"==_.headers.get("Content-Type"))throw t;console.warn("`WebAssembly.instantiateStreaming` failed because your server does not serve wasm with `application/wasm` MIME type. Falling back to `WebAssembly.instantiate` which is slower. Original error:\n",t)}const e=await _.arrayBuffer();return await WebAssembly.instantiate(e,t)}{const e=await WebAssembly.instantiate(_,t);return e instanceof WebAssembly.Instance?{instance:e,module:_}:e}}(await t,r);return g_(n,i)}var d_=Object.freeze({__proto__:null,Address:T,Execution:z,ExecutionResponse:O,Field:K,KeyPair:E,Metadata:I,OfflineQuery:C,PrivateKey:W,PrivateKeyCiphertext:$,Program:J,ProgramManager:class{__destroy_into_raw(){const _=this.__wbg_ptr;return this.__wbg_ptr=0,H.unregister(this),_}free(){const t=this.__destroy_into_raw();_.__wbg_programmanager_free(t)}static buildDeploymentTransaction(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g;let p=0;l(i)||(v(i,Z),p=i.__destroy_into_raw());var y=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),m=g;let h=0;l(s)||(v(s,Q),h=s.__destroy_into_raw());let k=0;l(w)||(v(w,i_),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,C),P=d.__destroy_into_raw());return n(_.programmanager_buildDeploymentTransaction(t.__wbg_ptr,u,f,r,p,y,m,l(a)?0:c(a),h,k,P))}static estimateDeploymentFee(t,e){const r=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),i=g;return n(_.programmanager_estimateDeploymentFee(r,i,l(e)?0:c(e)))}static estimateProgramNameCost(t){try{const i=_.__wbindgen_add_to_stack_pointer(-16),o=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),a=g;_.programmanager_estimateProgramNameCost(i,o,a);var e=S()[i/8+0],r=f()[i/4+2];if(f()[i/4+3])throw n(r);return BigInt.asUintN(64,e)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static executeFunctionOffline(t,e,r,i,o,a,s,w,d,u,f){v(t,W);const p=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g,m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(w)||(v(w,Q),k=w.__destroy_into_raw());let P=0;l(d)||(v(d,i_),P=d.__destroy_into_raw());var S=l(u)?0:b(u,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(f)||(v(f,C),x=f.__destroy_into_raw());return n(_.programmanager_executeFunctionOffline(t.__wbg_ptr,p,y,m,h,c(i),o,a,l(s)?0:c(s),k,P,S,V,x))}static buildExecutionTransaction(t,e,r,i,o,a,s,w,d,u,f,p,y){v(t,W);const m=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;let S=0;l(a)||(v(a,Z),S=a.__destroy_into_raw());var V=l(s)?0:b(s,_.__wbindgen_malloc,_.__wbindgen_realloc),x=g;let F=0;l(d)||(v(d,Q),F=d.__destroy_into_raw());let T=0;l(u)||(v(u,i_),T=u.__destroy_into_raw());let R=0;l(f)||(v(f,Q),R=f.__destroy_into_raw());let z=0;l(p)||(v(p,i_),z=p.__destroy_into_raw());let A=0;l(y)||(v(y,C),A=y.__destroy_into_raw());return n(_.programmanager_buildExecutionTransaction(t.__wbg_ptr,m,h,k,P,c(i),o,S,V,x,l(w)?0:c(w),F,T,R,z,A))}static estimateExecutionFee(t,e,r,i,o,a,s,w,d){v(t,W);const u=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),f=g,p=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),y=g;var m=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(w)||(v(w,i_),P=w.__destroy_into_raw());let S=0;l(d)||(v(d,C),S=d.__destroy_into_raw());return n(_.programmanager_estimateExecutionFee(t.__wbg_ptr,u,f,p,y,c(i),m,h,l(a)?0:c(a),k,P,S))}static estimateFinalizeFee(t,e){try{const o=_.__wbindgen_add_to_stack_pointer(-16),a=b(t,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,c=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.programmanager_estimateFinalizeFee(o,a,s,c,w);var r=S()[o/8+0],i=f()[o/4+2];if(f()[o/4+3])throw n(i);return BigInt.asUintN(64,r)}finally{_.__wbindgen_add_to_stack_pointer(16)}}static buildJoinTransaction(t,e,r,i,o,a,s,c,w,d,u){v(t,W),v(e,Z);var f=e.__destroy_into_raw();v(r,Z);var p=r.__destroy_into_raw();let y=0;l(o)||(v(o,Z),y=o.__destroy_into_raw());var m=l(a)?0:b(a,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g;let k=0;l(s)||(v(s,Q),k=s.__destroy_into_raw());let P=0;l(c)||(v(c,i_),P=c.__destroy_into_raw());let S=0;l(w)||(v(w,Q),S=w.__destroy_into_raw());let V=0;l(d)||(v(d,i_),V=d.__destroy_into_raw());let x=0;l(u)||(v(u,C),x=u.__destroy_into_raw());return n(_.programmanager_buildJoinTransaction(t.__wbg_ptr,f,p,i,y,m,h,k,P,S,V,x))}static buildSplitTransaction(t,e,r,i,o,a,s){v(t,W),v(r,Z);var c=r.__destroy_into_raw(),w=l(i)?0:b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;let u=0;l(o)||(v(o,Q),u=o.__destroy_into_raw());let f=0;l(a)||(v(a,i_),f=a.__destroy_into_raw());let p=0;l(s)||(v(s,C),p=s.__destroy_into_raw());return n(_.programmanager_buildSplitTransaction(t.__wbg_ptr,e,c,w,d,u,f,p))}static buildTransferTransaction(t,e,r,i,o,a,s,c,w,d,u,f,p,y){v(t,W);const m=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),h=g,k=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),P=g;var S=l(o)?0:b(o,_.__wbindgen_malloc,_.__wbindgen_realloc),V=g;let x=0;l(a)||(v(a,Z),x=a.__destroy_into_raw());let F=0;l(c)||(v(c,Z),F=c.__destroy_into_raw());var T=l(w)?0:b(w,_.__wbindgen_malloc,_.__wbindgen_realloc),R=g;let z=0;l(d)||(v(d,Q),z=d.__destroy_into_raw());let A=0;l(u)||(v(u,i_),A=u.__destroy_into_raw());let O=0;l(f)||(v(f,Q),O=f.__destroy_into_raw());let j=0;l(p)||(v(p,i_),j=p.__destroy_into_raw());let K=0;l(y)||(v(y,C),K=y.__destroy_into_raw());return n(_.programmanager_buildTransferTransaction(t.__wbg_ptr,e,m,h,k,P,S,V,x,s,F,T,R,z,A,O,j,K))}static synthesizeKeyPair(t,e,r,i,o){v(t,W);const a=b(e,_.__wbindgen_malloc,_.__wbindgen_realloc),s=g,w=b(r,_.__wbindgen_malloc,_.__wbindgen_realloc),d=g;return n(_.programmanager_synthesizeKeyPair(t.__wbg_ptr,a,s,w,d,c(i),l(o)?0:c(o)))}},ProvingKey:Q,RecordCiphertext:G,RecordPlaintext:Z,Signature:t_,Transaction:r_,VerifyingKey:i_,ViewKey:a_,default:w_,initSync:function(t,e){if(void 0!==_)return _;const r=s_();return c_(r,e),t instanceof WebAssembly.Module||(t=new WebAssembly.Module(t)),g_(new WebAssembly.Instance(t,r),t)},initThreadPool:function(t,e){return n(_.initThreadPool(c(t),e))},runRayonThread:function(t){_.runRayonThread(t)},verifyFunctionExecution:function(t,e,r,i){try{const s=_.__wbindgen_add_to_stack_pointer(-16);v(t,z),v(e,i_),v(r,J);const c=b(i,_.__wbindgen_malloc,_.__wbindgen_realloc),w=g;_.verifyFunctionExecution(s,t.__wbg_ptr,e.__wbg_ptr,r.__wbg_ptr,c,w);var o=f()[s/4+0],a=f()[s/4+1];if(f()[s/4+2])throw n(a);return 0!==o}finally{_.__wbindgen_add_to_stack_pointer(16)}}});await async function(_){const[t,{module:e,memory:r,address:n}]=await Promise.all([_,new Promise((_=>{addEventListener("message",(t=>{_(t.data)}),{capture:!0,once:!0})}))]),i=await t({initializeHook:(_,t)=>_(e,r)});postMessage(null),i.runRayonThread(n),close()}((async(_={})=>{let{importHook:t,serverPath:e,initializeHook:r}=_,n="assets/aleo_wasm.wasm";return null!=e&&(n=e+/[^\/\\]*$/.exec(n)[0]),null!=t&&(n=t(n)),null!=r?await r(w_,n):await w_(n),d_})); \ No newline at end of file diff --git a/index.bundle.js b/index.bundle.js index ad721c41a..dba2bf066 100644 --- a/index.bundle.js +++ b/index.bundle.js @@ -1,3 +1,3 @@ /*! For license information please see index.bundle.js.LICENSE.txt */ -(()=>{var e,t,n,r,o,i,a,l,s={9937:(e,t)=>{var n="function"==typeof Symbol&&Symbol.for,r=n?Symbol.for("react.element"):60103,o=n?Symbol.for("react.portal"):60106,i=n?Symbol.for("react.fragment"):60107,a=n?Symbol.for("react.strict_mode"):60108,l=n?Symbol.for("react.profiler"):60114,s=n?Symbol.for("react.provider"):60109,c=n?Symbol.for("react.context"):60110,u=n?Symbol.for("react.async_mode"):60111,d=n?Symbol.for("react.concurrent_mode"):60111,f=n?Symbol.for("react.forward_ref"):60112,h=n?Symbol.for("react.suspense"):60113,p=n?Symbol.for("react.suspense_list"):60120,m=n?Symbol.for("react.memo"):60115,g=n?Symbol.for("react.lazy"):60116,v=n?Symbol.for("react.block"):60121,y=n?Symbol.for("react.fundamental"):60117,b=n?Symbol.for("react.responder"):60118,w=n?Symbol.for("react.scope"):60119;function x(e){if("object"==typeof e&&null!==e){var t=e.$$typeof;switch(t){case r:switch(e=e.type){case u:case d:case i:case l:case a:case h:return e;default:switch(e=e&&e.$$typeof){case c:case f:case g:case m:case s:return e;default:return t}}case o:return t}}}function S(e){return x(e)===d}t.isFragment=function(e){return x(e)===i},t.isMemo=function(e){return x(e)===m}},7702:(e,t,n)=>{e.exports=n(9937)},1033:(e,t)=>{var n,r=Symbol.for("react.element"),o=Symbol.for("react.portal"),i=Symbol.for("react.fragment"),a=Symbol.for("react.strict_mode"),l=Symbol.for("react.profiler"),s=Symbol.for("react.provider"),c=Symbol.for("react.context"),u=Symbol.for("react.server_context"),d=Symbol.for("react.forward_ref"),f=Symbol.for("react.suspense"),h=Symbol.for("react.suspense_list"),p=Symbol.for("react.memo"),m=Symbol.for("react.lazy"),g=Symbol.for("react.offscreen");function v(e){if("object"==typeof e&&null!==e){var t=e.$$typeof;switch(t){case r:switch(e=e.type){case i:case l:case a:case f:case h:return e;default:switch(e=e&&e.$$typeof){case u:case c:case d:case m:case p:case s:return e;default:return t}}case o:return t}}}n=Symbol.for("react.module.reference"),t.isFragment=function(e){return v(e)===i},t.isMemo=function(e){return v(e)===p}},688:(e,t,n)=>{e.exports=n(1033)},1189:(e,t)=>{var n;!function(){var r={}.hasOwnProperty;function o(){for(var e=[],t=0;t{var r=n(7924),o={"text/plain":"Text","text/html":"Url",default:"Text"};e.exports=function(e,t){var n,i,a,l,s,c,u=!1;t||(t={}),n=t.debug||!1;try{if(a=r(),l=document.createRange(),s=document.getSelection(),(c=document.createElement("span")).textContent=e,c.ariaHidden="true",c.style.all="unset",c.style.position="fixed",c.style.top=0,c.style.clip="rect(0, 0, 0, 0)",c.style.whiteSpace="pre",c.style.webkitUserSelect="text",c.style.MozUserSelect="text",c.style.msUserSelect="text",c.style.userSelect="text",c.addEventListener("copy",(function(r){if(r.stopPropagation(),t.format)if(r.preventDefault(),void 0===r.clipboardData){n&&console.warn("unable to use e.clipboardData"),n&&console.warn("trying IE specific stuff"),window.clipboardData.clearData();var i=o[t.format]||o.default;window.clipboardData.setData(i,e)}else r.clipboardData.clearData(),r.clipboardData.setData(t.format,e);t.onCopy&&(r.preventDefault(),t.onCopy(r.clipboardData))})),document.body.appendChild(c),l.selectNodeContents(c),s.addRange(l),!document.execCommand("copy"))throw new Error("copy command was unsuccessful");u=!0}catch(r){n&&console.error("unable to copy using execCommand: ",r),n&&console.warn("trying IE specific stuff");try{window.clipboardData.setData(t.format||"text",e),t.onCopy&&t.onCopy(window.clipboardData),u=!0}catch(r){n&&console.error("unable to copy using clipboardData: ",r),n&&console.error("falling back to prompt"),i=function(e){var t=(/mac os x/i.test(navigator.userAgent)?"⌘":"Ctrl")+"+C";return e.replace(/#{\s*key\s*}/g,t)}("message"in t?t.message:"Copy to clipboard: #{key}, Enter"),window.prompt(i,e)}}finally{s&&("function"==typeof s.removeRange?s.removeRange(l):s.removeAllRanges()),c&&document.body.removeChild(c),a()}return u}},9137:e=>{e.exports=function(e){var t=[];return t.toString=function(){return this.map((function(t){var n="",r=void 0!==t[5];return t[4]&&(n+="@supports (".concat(t[4],") {")),t[2]&&(n+="@media ".concat(t[2]," {")),r&&(n+="@layer".concat(t[5].length>0?" ".concat(t[5]):""," {")),n+=e(t),r&&(n+="}"),t[2]&&(n+="}"),t[4]&&(n+="}"),n})).join("")},t.i=function(e,n,r,o,i){"string"==typeof e&&(e=[[null,e,void 0]]);var a={};if(r)for(var l=0;l0?" ".concat(u[5]):""," {").concat(u[1],"}")),u[5]=i),n&&(u[2]?(u[1]="@media ".concat(u[2]," {").concat(u[1],"}"),u[2]=n):u[2]=n),o&&(u[4]?(u[1]="@supports (".concat(u[4],") {").concat(u[1],"}"),u[4]=o):u[4]="".concat(o)),t.push(u))}},t}},4362:e=>{e.exports=function(e,t){return t||(t={}),e?(e=String(e.__esModule?e.default:e),/^['"].*['"]$/.test(e)&&(e=e.slice(1,-1)),t.hash&&(e+=t.hash),/["'() \t\n]|(%20)/.test(e)||t.needQuotes?'"'.concat(e.replace(/"/g,'\\"').replace(/\n/g,"\\n"),'"'):e):e}},7506:e=>{e.exports=function(e){var t=e[1],n=e[3];if(!n)return t;if("function"==typeof btoa){var r=btoa(unescape(encodeURIComponent(JSON.stringify(n)))),o="sourceMappingURL=data:application/json;charset=utf-8;base64,".concat(r),i="/*# ".concat(o," */");return[t].concat([i]).join("\n")}return[t].join("\n")}},3991:(e,t,n)=>{var r=n(8963).Symbol;e.exports=r},445:e=>{e.exports=function(e,t){for(var n=-1,r=null==e?0:e.length,o=Array(r);++n{e.exports=function(e,t,n,r){var o=-1,i=null==e?0:e.length;for(r&&i&&(n=e[++o]);++o{e.exports=function(e){return e.split("")}},1633:e=>{var t=/[^\x00-\x2f\x3a-\x40\x5b-\x60\x7b-\x7f]+/g;e.exports=function(e){return e.match(t)||[]}},2154:(e,t,n)=>{var r=n(3991),o=n(3447),i=n(4106),a=r?r.toStringTag:void 0;e.exports=function(e){return null==e?void 0===e?"[object Undefined]":"[object Null]":a&&a in Object(e)?o(e):i(e)}},9401:e=>{e.exports=function(e){return function(t){return null==e?void 0:e[t]}}},3588:e=>{e.exports=function(e,t,n){var r=-1,o=e.length;t<0&&(t=-t>o?0:o+t),(n=n>o?o:n)<0&&(n+=o),o=t>n?0:n-t>>>0,t>>>=0;for(var i=Array(o);++r{var r=n(3991),o=n(445),i=n(3002),a=n(5088),l=r?r.prototype:void 0,s=l?l.toString:void 0;e.exports=function e(t){if("string"==typeof t)return t;if(i(t))return o(t,e)+"";if(a(t))return s?s.call(t):"";var n=t+"";return"0"==n&&1/t==-Infinity?"-0":n}},1332:(e,t,n)=>{var r=n(3588);e.exports=function(e,t,n){var o=e.length;return n=void 0===n?o:n,!t&&n>=o?e:r(e,t,n)}},509:(e,t,n)=>{var r=n(1332),o=n(3043),i=n(6705),a=n(6438);e.exports=function(e){return function(t){t=a(t);var n=o(t)?i(t):void 0,l=n?n[0]:t.charAt(0),s=n?r(n,1).join(""):t.slice(1);return l[e]()+s}}},4033:(e,t,n)=>{var r=n(7537),o=n(5921),i=n(2006),a=RegExp("['’]","g");e.exports=function(e){return function(t){return r(i(o(t).replace(a,"")),e,"")}}},7959:(e,t,n)=>{var r=n(9401)({À:"A",Á:"A",Â:"A",Ã:"A",Ä:"A",Å:"A",à:"a",á:"a",â:"a",ã:"a",ä:"a",å:"a",Ç:"C",ç:"c",Ð:"D",ð:"d",È:"E",É:"E",Ê:"E",Ë:"E",è:"e",é:"e",ê:"e",ë:"e",Ì:"I",Í:"I",Î:"I",Ï:"I",ì:"i",í:"i",î:"i",ï:"i",Ñ:"N",ñ:"n",Ò:"O",Ó:"O",Ô:"O",Õ:"O",Ö:"O",Ø:"O",ò:"o",ó:"o",ô:"o",õ:"o",ö:"o",ø:"o",Ù:"U",Ú:"U",Û:"U",Ü:"U",ù:"u",ú:"u",û:"u",ü:"u",Ý:"Y",ý:"y",ÿ:"y",Æ:"Ae",æ:"ae",Þ:"Th",þ:"th",ß:"ss",Ā:"A",Ă:"A",Ą:"A",ā:"a",ă:"a",ą:"a",Ć:"C",Ĉ:"C",Ċ:"C",Č:"C",ć:"c",ĉ:"c",ċ:"c",č:"c",Ď:"D",Đ:"D",ď:"d",đ:"d",Ē:"E",Ĕ:"E",Ė:"E",Ę:"E",Ě:"E",ē:"e",ĕ:"e",ė:"e",ę:"e",ě:"e",Ĝ:"G",Ğ:"G",Ġ:"G",Ģ:"G",ĝ:"g",ğ:"g",ġ:"g",ģ:"g",Ĥ:"H",Ħ:"H",ĥ:"h",ħ:"h",Ĩ:"I",Ī:"I",Ĭ:"I",Į:"I",İ:"I",ĩ:"i",ī:"i",ĭ:"i",į:"i",ı:"i",Ĵ:"J",ĵ:"j",Ķ:"K",ķ:"k",ĸ:"k",Ĺ:"L",Ļ:"L",Ľ:"L",Ŀ:"L",Ł:"L",ĺ:"l",ļ:"l",ľ:"l",ŀ:"l",ł:"l",Ń:"N",Ņ:"N",Ň:"N",Ŋ:"N",ń:"n",ņ:"n",ň:"n",ŋ:"n",Ō:"O",Ŏ:"O",Ő:"O",ō:"o",ŏ:"o",ő:"o",Ŕ:"R",Ŗ:"R",Ř:"R",ŕ:"r",ŗ:"r",ř:"r",Ś:"S",Ŝ:"S",Ş:"S",Š:"S",ś:"s",ŝ:"s",ş:"s",š:"s",Ţ:"T",Ť:"T",Ŧ:"T",ţ:"t",ť:"t",ŧ:"t",Ũ:"U",Ū:"U",Ŭ:"U",Ů:"U",Ű:"U",Ų:"U",ũ:"u",ū:"u",ŭ:"u",ů:"u",ű:"u",ų:"u",Ŵ:"W",ŵ:"w",Ŷ:"Y",ŷ:"y",Ÿ:"Y",Ź:"Z",Ż:"Z",Ž:"Z",ź:"z",ż:"z",ž:"z",IJ:"IJ",ij:"ij",Œ:"Oe",œ:"oe",ʼn:"'n",ſ:"s"});e.exports=r},4967:(e,t,n)=>{var r="object"==typeof n.g&&n.g&&n.g.Object===Object&&n.g;e.exports=r},3447:(e,t,n)=>{var r=n(3991),o=Object.prototype,i=o.hasOwnProperty,a=o.toString,l=r?r.toStringTag:void 0;e.exports=function(e){var t=i.call(e,l),n=e[l];try{e[l]=void 0;var r=!0}catch(e){}var o=a.call(e);return r&&(t?e[l]=n:delete e[l]),o}},3043:e=>{var t=RegExp("[\\u200d\\ud800-\\udfff\\u0300-\\u036f\\ufe20-\\ufe2f\\u20d0-\\u20ff\\ufe0e\\ufe0f]");e.exports=function(e){return t.test(e)}},3776:e=>{var t=/[a-z][A-Z]|[A-Z]{2}[a-z]|[0-9][a-zA-Z]|[a-zA-Z][0-9]|[^a-zA-Z0-9 ]/;e.exports=function(e){return t.test(e)}},4106:e=>{var t=Object.prototype.toString;e.exports=function(e){return t.call(e)}},8963:(e,t,n)=>{var r=n(4967),o="object"==typeof self&&self&&self.Object===Object&&self,i=r||o||Function("return this")();e.exports=i},6705:(e,t,n)=>{var r=n(3146),o=n(3043),i=n(9073);e.exports=function(e){return o(e)?i(e):r(e)}},9073:e=>{var t="\\ud800-\\udfff",n="["+t+"]",r="[\\u0300-\\u036f\\ufe20-\\ufe2f\\u20d0-\\u20ff]",o="\\ud83c[\\udffb-\\udfff]",i="[^"+t+"]",a="(?:\\ud83c[\\udde6-\\uddff]){2}",l="[\\ud800-\\udbff][\\udc00-\\udfff]",s="(?:"+r+"|"+o+")"+"?",c="[\\ufe0e\\ufe0f]?",u=c+s+("(?:\\u200d(?:"+[i,a,l].join("|")+")"+c+s+")*"),d="(?:"+[i+r+"?",r,a,l,n].join("|")+")",f=RegExp(o+"(?="+o+")|"+d+u,"g");e.exports=function(e){return e.match(f)||[]}},5768:e=>{var t="\\ud800-\\udfff",n="\\u2700-\\u27bf",r="a-z\\xdf-\\xf6\\xf8-\\xff",o="A-Z\\xc0-\\xd6\\xd8-\\xde",i="\\xac\\xb1\\xd7\\xf7\\x00-\\x2f\\x3a-\\x40\\x5b-\\x60\\x7b-\\xbf\\u2000-\\u206f \\t\\x0b\\f\\xa0\\ufeff\\n\\r\\u2028\\u2029\\u1680\\u180e\\u2000\\u2001\\u2002\\u2003\\u2004\\u2005\\u2006\\u2007\\u2008\\u2009\\u200a\\u202f\\u205f\\u3000",a="["+i+"]",l="\\d+",s="["+n+"]",c="["+r+"]",u="[^"+t+i+l+n+r+o+"]",d="(?:\\ud83c[\\udde6-\\uddff]){2}",f="[\\ud800-\\udbff][\\udc00-\\udfff]",h="["+o+"]",p="(?:"+c+"|"+u+")",m="(?:"+h+"|"+u+")",g="(?:['’](?:d|ll|m|re|s|t|ve))?",v="(?:['’](?:D|LL|M|RE|S|T|VE))?",y="(?:[\\u0300-\\u036f\\ufe20-\\ufe2f\\u20d0-\\u20ff]|\\ud83c[\\udffb-\\udfff])?",b="[\\ufe0e\\ufe0f]?",w=b+y+("(?:\\u200d(?:"+["[^"+t+"]",d,f].join("|")+")"+b+y+")*"),x="(?:"+[s,d,f].join("|")+")"+w,S=RegExp([h+"?"+c+"+"+g+"(?="+[a,h,"$"].join("|")+")",m+"+"+v+"(?="+[a,h+p,"$"].join("|")+")",h+"?"+p+"+"+g,h+"+"+v,"\\d*(?:1ST|2ND|3RD|(?![123])\\dTH)(?=\\b|[a-z_])","\\d*(?:1st|2nd|3rd|(?![123])\\dth)(?=\\b|[A-Z_])",l,x].join("|"),"g");e.exports=function(e){return e.match(S)||[]}},7930:(e,t,n)=>{var r=n(414),o=n(4033)((function(e,t,n){return t=t.toLowerCase(),e+(n?r(t):t)}));e.exports=o},414:(e,t,n)=>{var r=n(6438),o=n(1409);e.exports=function(e){return o(r(e).toLowerCase())}},5921:(e,t,n)=>{var r=n(7959),o=n(6438),i=/[\xc0-\xd6\xd8-\xf6\xf8-\xff\u0100-\u017f]/g,a=RegExp("[\\u0300-\\u036f\\ufe20-\\ufe2f\\u20d0-\\u20ff]","g");e.exports=function(e){return(e=o(e))&&e.replace(i,r).replace(a,"")}},3002:e=>{var t=Array.isArray;e.exports=t},2857:e=>{e.exports=function(e){return null!=e&&"object"==typeof e}},5088:(e,t,n)=>{var r=n(2154),o=n(2857);e.exports=function(e){return"symbol"==typeof e||o(e)&&"[object Symbol]"==r(e)}},6438:(e,t,n)=>{var r=n(9604);e.exports=function(e){return null==e?"":r(e)}},1409:(e,t,n)=>{var r=n(509)("toUpperCase");e.exports=r},2006:(e,t,n)=>{var r=n(1633),o=n(3776),i=n(6438),a=n(5768);e.exports=function(e,t,n){return e=i(e),void 0===(t=n?void 0:t)?o(e)?a(e):r(e):e.match(t)||[]}},2324:(e,t)=>{var n,r=Symbol.for("react.element"),o=Symbol.for("react.portal"),i=Symbol.for("react.fragment"),a=Symbol.for("react.strict_mode"),l=Symbol.for("react.profiler"),s=Symbol.for("react.provider"),c=Symbol.for("react.context"),u=Symbol.for("react.server_context"),d=Symbol.for("react.forward_ref"),f=Symbol.for("react.suspense"),h=Symbol.for("react.suspense_list"),p=Symbol.for("react.memo"),m=Symbol.for("react.lazy"),g=Symbol.for("react.offscreen");function v(e){if("object"==typeof e&&null!==e){var t=e.$$typeof;switch(t){case r:switch(e=e.type){case i:case l:case a:case f:case h:return e;default:switch(e=e&&e.$$typeof){case u:case c:case d:case m:case p:case s:return e;default:return t}}case o:return t}}}n=Symbol.for("react.module.reference"),t.isMemo=function(e){return v(e)===p}},7661:(e,t,n)=>{e.exports=n(2324)},9973:(e,t)=>{var n,r=Symbol.for("react.element"),o=Symbol.for("react.portal"),i=Symbol.for("react.fragment"),a=Symbol.for("react.strict_mode"),l=Symbol.for("react.profiler"),s=Symbol.for("react.provider"),c=Symbol.for("react.context"),u=Symbol.for("react.server_context"),d=Symbol.for("react.forward_ref"),f=Symbol.for("react.suspense"),h=Symbol.for("react.suspense_list"),p=Symbol.for("react.memo"),m=Symbol.for("react.lazy"),g=Symbol.for("react.offscreen");function v(e){if("object"==typeof e&&null!==e){var t=e.$$typeof;switch(t){case r:switch(e=e.type){case i:case l:case a:case f:case h:return e;default:switch(e=e&&e.$$typeof){case u:case c:case d:case m:case p:case s:return e;default:return t}}case o:return t}}}n=Symbol.for("react.module.reference"),t.isMemo=function(e){return v(e)===p}},616:(e,t,n)=>{e.exports=n(9973)},9391:(e,t,n)=>{var r=n(6036),o=n(2004);function i(e){for(var t="https://reactjs.org/docs/error-decoder.html?invariant="+e,n=1;n