ETH Price: $2,434.26 (+0.91%)
Gas: 3.13 Gwei

Transaction Decoder

Block:
21048810 at Oct-26-2024 09:09:47 AM +UTC
Transaction Fee:
0.000341311513475755 ETH $0.83
Gas Used:
65,113 Gas / 5.241833635 Gwei

Emitted Events:

800 EntryPoint.Deposited( account=[Receiver] VerifyingSingletonPaymaster, totalDeposit=2314813156401841957 )
801 VerifyingSingletonPaymaster.GasDeposited( _paymasterId=[Sender] 0x42e044334a2f341f94436007d838d4627595ac95, _value=3000000000000000 )

Account State Difference:

  Address   Before After State Difference Code
0x00000f79...08Af44789
(Biconomy : Verifying Paymaster V1.1.0)
0x42E04433...27595Ac95
0.004920378338596125 Eth
Nonce: 2
0.00157906682512037 Eth
Nonce: 3
0.003341311513475755
0x5FF137D4...a026d2789
(Entry Point 0.6.0)
68.222570095801131806 Eth68.225570095801131806 Eth0.003
(beaverbuild)
13.644035845644260772 Eth13.64409186218404861 Eth0.000056016539787838

Execution Trace

ETH 0.003 VerifyingSingletonPaymaster.depositFor( paymasterId=0x42E044334a2F341f94436007D838D4627595Ac95 )
  • ETH 0.003 EntryPoint.depositTo( account=0x00000f79B7FaF42EEBAdbA19aCc07cD08Af44789 )
    File 1 of 2: VerifyingSingletonPaymaster
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable no-inline-assembly */
    /**
     * returned data from validateUserOp.
     * validateUserOp returns a uint256, with is created by `_packedValidationData` and parsed by `_parseValidationData`
     * @param aggregator - address(0) - the account validated the signature by itself.
     *              address(1) - the account failed to validate the signature.
     *              otherwise - this is an address of a signature aggregator that must be used to validate the signature.
     * @param validAfter - this UserOp is valid only after this timestamp.
     * @param validaUntil - this UserOp is valid only up to this timestamp.
     */
        struct ValidationData {
            address aggregator;
            uint48 validAfter;
            uint48 validUntil;
        }
    //extract sigFailed, validAfter, validUntil.
    // also convert zero validUntil to type(uint48).max
        function _parseValidationData(uint validationData) pure returns (ValidationData memory data) {
            address aggregator = address(uint160(validationData));
            uint48 validUntil = uint48(validationData >> 160);
            if (validUntil == 0) {
                validUntil = type(uint48).max;
            }
            uint48 validAfter = uint48(validationData >> (48 + 160));
            return ValidationData(aggregator, validAfter, validUntil);
        }
    // intersect account and paymaster ranges.
        function _intersectTimeRange(uint256 validationData, uint256 paymasterValidationData) pure returns (ValidationData memory) {
            ValidationData memory accountValidationData = _parseValidationData(validationData);
            ValidationData memory pmValidationData = _parseValidationData(paymasterValidationData);
            address aggregator = accountValidationData.aggregator;
            if (aggregator == address(0)) {
                aggregator = pmValidationData.aggregator;
            }
            uint48 validAfter = accountValidationData.validAfter;
            uint48 validUntil = accountValidationData.validUntil;
            uint48 pmValidAfter = pmValidationData.validAfter;
            uint48 pmValidUntil = pmValidationData.validUntil;
            if (validAfter < pmValidAfter) validAfter = pmValidAfter;
            if (validUntil > pmValidUntil) validUntil = pmValidUntil;
            return ValidationData(aggregator, validAfter, validUntil);
        }
    /**
     * helper to pack the return value for validateUserOp
     * @param data - the ValidationData to pack
     */
        function _packValidationData(ValidationData memory data) pure returns (uint256) {
            return uint160(data.aggregator) | (uint256(data.validUntil) << 160) | (uint256(data.validAfter) << (160 + 48));
        }
    /**
     * helper to pack the return value for validateUserOp, when not using an aggregator
     * @param sigFailed - true for signature failure, false for success
     * @param validUntil last timestamp this UserOperation is valid (or zero for infinite)
     * @param validAfter first timestamp this UserOperation is valid
     */
        function _packValidationData(bool sigFailed, uint48 validUntil, uint48 validAfter) pure returns (uint256) {
            return (sigFailed ? 1 : 0) | (uint256(validUntil) << 160) | (uint256(validAfter) << (160 + 48));
        }
    /**
     * keccak function over calldata.
     * @dev copy calldata into memory, do keccak and drop allocated memory. Strangely, this is more efficient than letting solidity do it.
     */
        function calldataKeccak(bytes calldata data) pure returns (bytes32 ret) {
            assembly {
                let mem := mload(0x40)
                let len := data.length
                calldatacopy(mem, data.offset, len)
                ret := keccak256(mem, len)
            }
        }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "./UserOperation.sol";
    /**
     * Aggregated Signatures validator.
     */
    interface IAggregator {
        /**
         * validate aggregated signature.
         * revert if the aggregated signature does not match the given list of operations.
         */
        function validateSignatures(UserOperation[] calldata userOps, bytes calldata signature) external view;
        /**
         * validate signature of a single userOp
         * This method is should be called by bundler after EntryPoint.simulateValidation() returns (reverts) with ValidationResultWithAggregation
         * First it validates the signature over the userOp. Then it returns data to be used when creating the handleOps.
         * @param userOp the userOperation received from the user.
         * @return sigForUserOp the value to put into the signature field of the userOp when calling handleOps.
         *    (usually empty, unless account and aggregator support some kind of "multisig"
         */
        function validateUserOpSignature(UserOperation calldata userOp)
        external view returns (bytes memory sigForUserOp);
        /**
         * aggregate multiple signatures into a single value.
         * This method is called off-chain to calculate the signature to pass with handleOps()
         * bundler MAY use optimized custom code perform this aggregation
         * @param userOps array of UserOperations to collect the signatures from.
         * @return aggregatedSignature the aggregated signature
         */
        function aggregateSignatures(UserOperation[] calldata userOps) external view returns (bytes memory aggregatedSignature);
    }
    /**
     ** Account-Abstraction (EIP-4337) singleton EntryPoint implementation.
     ** Only one instance required on each chain.
     **/
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable avoid-low-level-calls */
    /* solhint-disable no-inline-assembly */
    /* solhint-disable reason-string */
    import "./UserOperation.sol";
    import "./IStakeManager.sol";
    import "./IAggregator.sol";
    import "./INonceManager.sol";
    interface IEntryPoint is IStakeManager, INonceManager {
        /***
         * An event emitted after each successful request
         * @param userOpHash - unique identifier for the request (hash its entire content, except signature).
         * @param sender - the account that generates this request.
         * @param paymaster - if non-null, the paymaster that pays for this request.
         * @param nonce - the nonce value from the request.
         * @param success - true if the sender transaction succeeded, false if reverted.
         * @param actualGasCost - actual amount paid (by account or paymaster) for this UserOperation.
         * @param actualGasUsed - total gas used by this UserOperation (including preVerification, creation, validation and execution).
         */
        event UserOperationEvent(bytes32 indexed userOpHash, address indexed sender, address indexed paymaster, uint256 nonce, bool success, uint256 actualGasCost, uint256 actualGasUsed);
        /**
         * account "sender" was deployed.
         * @param userOpHash the userOp that deployed this account. UserOperationEvent will follow.
         * @param sender the account that is deployed
         * @param factory the factory used to deploy this account (in the initCode)
         * @param paymaster the paymaster used by this UserOp
         */
        event AccountDeployed(bytes32 indexed userOpHash, address indexed sender, address factory, address paymaster);
        /**
         * An event emitted if the UserOperation "callData" reverted with non-zero length
         * @param userOpHash the request unique identifier.
         * @param sender the sender of this request
         * @param nonce the nonce used in the request
         * @param revertReason - the return bytes from the (reverted) call to "callData".
         */
        event UserOperationRevertReason(bytes32 indexed userOpHash, address indexed sender, uint256 nonce, bytes revertReason);
        /**
         * an event emitted by handleOps(), before starting the execution loop.
         * any event emitted before this event, is part of the validation.
         */
        event BeforeExecution();
        /**
         * signature aggregator used by the following UserOperationEvents within this bundle.
         */
        event SignatureAggregatorChanged(address indexed aggregator);
        /**
         * a custom revert error of handleOps, to identify the offending op.
         *  NOTE: if simulateValidation passes successfully, there should be no reason for handleOps to fail on it.
         *  @param opIndex - index into the array of ops to the failed one (in simulateValidation, this is always zero)
         *  @param reason - revert reason
         *      The string starts with a unique code "AAmn", where "m" is "1" for factory, "2" for account and "3" for paymaster issues,
         *      so a failure can be attributed to the correct entity.
         *   Should be caught in off-chain handleOps simulation and not happen on-chain.
         *   Useful for mitigating DoS attempts against batchers or for troubleshooting of factory/account/paymaster reverts.
         */
        error FailedOp(uint256 opIndex, string reason);
        /**
         * error case when a signature aggregator fails to verify the aggregated signature it had created.
         */
        error SignatureValidationFailed(address aggregator);
        /**
         * Successful result from simulateValidation.
         * @param returnInfo gas and time-range returned values
         * @param senderInfo stake information about the sender
         * @param factoryInfo stake information about the factory (if any)
         * @param paymasterInfo stake information about the paymaster (if any)
         */
        error ValidationResult(ReturnInfo returnInfo,
            StakeInfo senderInfo, StakeInfo factoryInfo, StakeInfo paymasterInfo);
        /**
         * Successful result from simulateValidation, if the account returns a signature aggregator
         * @param returnInfo gas and time-range returned values
         * @param senderInfo stake information about the sender
         * @param factoryInfo stake information about the factory (if any)
         * @param paymasterInfo stake information about the paymaster (if any)
         * @param aggregatorInfo signature aggregation info (if the account requires signature aggregator)
         *      bundler MUST use it to verify the signature, or reject the UserOperation
         */
        error ValidationResultWithAggregation(ReturnInfo returnInfo,
            StakeInfo senderInfo, StakeInfo factoryInfo, StakeInfo paymasterInfo,
            AggregatorStakeInfo aggregatorInfo);
        /**
         * return value of getSenderAddress
         */
        error SenderAddressResult(address sender);
        /**
         * return value of simulateHandleOp
         */
        error ExecutionResult(uint256 preOpGas, uint256 paid, uint48 validAfter, uint48 validUntil, bool targetSuccess, bytes targetResult);
        //UserOps handled, per aggregator
        struct UserOpsPerAggregator {
            UserOperation[] userOps;
            // aggregator address
            IAggregator aggregator;
            // aggregated signature
            bytes signature;
        }
        /**
         * Execute a batch of UserOperation.
         * no signature aggregator is used.
         * if any account requires an aggregator (that is, it returned an aggregator when
         * performing simulateValidation), then handleAggregatedOps() must be used instead.
         * @param ops the operations to execute
         * @param beneficiary the address to receive the fees
         */
        function handleOps(UserOperation[] calldata ops, address payable beneficiary) external;
        /**
         * Execute a batch of UserOperation with Aggregators
         * @param opsPerAggregator the operations to execute, grouped by aggregator (or address(0) for no-aggregator accounts)
         * @param beneficiary the address to receive the fees
         */
        function handleAggregatedOps(
            UserOpsPerAggregator[] calldata opsPerAggregator,
            address payable beneficiary
        ) external;
        /**
         * generate a request Id - unique identifier for this request.
         * the request ID is a hash over the content of the userOp (except the signature), the entrypoint and the chainid.
         */
        function getUserOpHash(UserOperation calldata userOp) external view returns (bytes32);
        /**
         * Simulate a call to account.validateUserOp and paymaster.validatePaymasterUserOp.
         * @dev this method always revert. Successful result is ValidationResult error. other errors are failures.
         * @dev The node must also verify it doesn't use banned opcodes, and that it doesn't reference storage outside the account's data.
         * @param userOp the user operation to validate.
         */
        function simulateValidation(UserOperation calldata userOp) external;
        /**
         * gas and return values during simulation
         * @param preOpGas the gas used for validation (including preValidationGas)
         * @param prefund the required prefund for this operation
         * @param sigFailed validateUserOp's (or paymaster's) signature check failed
         * @param validAfter - first timestamp this UserOp is valid (merging account and paymaster time-range)
         * @param validUntil - last timestamp this UserOp is valid (merging account and paymaster time-range)
         * @param paymasterContext returned by validatePaymasterUserOp (to be passed into postOp)
         */
        struct ReturnInfo {
            uint256 preOpGas;
            uint256 prefund;
            bool sigFailed;
            uint48 validAfter;
            uint48 validUntil;
            bytes paymasterContext;
        }
        /**
         * returned aggregated signature info.
         * the aggregator returned by the account, and its current stake.
         */
        struct AggregatorStakeInfo {
            address aggregator;
            StakeInfo stakeInfo;
        }
        /**
         * Get counterfactual sender address.
         *  Calculate the sender contract address that will be generated by the initCode and salt in the UserOperation.
         * this method always revert, and returns the address in SenderAddressResult error
         * @param initCode the constructor code to be passed into the UserOperation.
         */
        function getSenderAddress(bytes memory initCode) external;
        /**
         * simulate full execution of a UserOperation (including both validation and target execution)
         * this method will always revert with "ExecutionResult".
         * it performs full validation of the UserOperation, but ignores signature error.
         * an optional target address is called after the userop succeeds, and its value is returned
         * (before the entire call is reverted)
         * Note that in order to collect the the success/failure of the target call, it must be executed
         * with trace enabled to track the emitted events.
         * @param op the UserOperation to simulate
         * @param target if nonzero, a target address to call after userop simulation. If called, the targetSuccess and targetResult
         *        are set to the return from that call.
         * @param targetCallData callData to pass to target address
         */
        function simulateHandleOp(UserOperation calldata op, address target, bytes calldata targetCallData) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    interface INonceManager {
        /**
         * Return the next nonce for this sender.
         * Within a given key, the nonce values are sequenced (starting with zero, and incremented by one on each userop)
         * But UserOp with different keys can come with arbitrary order.
         *
         * @param sender the account address
         * @param key the high 192 bit of the nonce
         * @return nonce a full nonce to pass for next UserOp with this sender.
         */
        function getNonce(address sender, uint192 key)
        external view returns (uint256 nonce);
        /**
         * Manually increment the nonce of the sender.
         * This method is exposed just for completeness..
         * Account does NOT need to call it, neither during validation, nor elsewhere,
         * as the EntryPoint will update the nonce regardless.
         * Possible use-case is call it with various keys to "initialize" their nonces to one, so that future
         * UserOperations will not pay extra for the first transaction with a given key.
         */
        function incrementNonce(uint192 key) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "./UserOperation.sol";
    /**
     * the interface exposed by a paymaster contract, who agrees to pay the gas for user's operations.
     * a paymaster must hold a stake to cover the required entrypoint stake and also the gas for the transaction.
     */
    interface IPaymaster {
        enum PostOpMode {
            opSucceeded, // user op succeeded
            opReverted, // user op reverted. still has to pay for gas.
            postOpReverted //user op succeeded, but caused postOp to revert. Now it's a 2nd call, after user's op was deliberately reverted.
        }
        /**
         * payment validation: check if paymaster agrees to pay.
         * Must verify sender is the entryPoint.
         * Revert to reject this request.
         * Note that bundlers will reject this method if it changes the state, unless the paymaster is trusted (whitelisted)
         * The paymaster pre-pays using its deposit, and receive back a refund after the postOp method returns.
         * @param userOp the user operation
         * @param userOpHash hash of the user's request data.
         * @param maxCost the maximum cost of this transaction (based on maximum gas and gas price from userOp)
         * @return context value to send to a postOp
         *      zero length to signify postOp is not required.
         * @return validationData signature and time-range of this operation, encoded the same as the return value of validateUserOperation
         *      <20-byte> sigAuthorizer - 0 for valid signature, 1 to mark signature failure,
         *         otherwise, an address of an "authorizer" contract.
         *      <6-byte> validUntil - last timestamp this operation is valid. 0 for "indefinite"
         *      <6-byte> validAfter - first timestamp this operation is valid
         *      Note that the validation code cannot use block.timestamp (or block.number) directly.
         */
        function validatePaymasterUserOp(UserOperation calldata userOp, bytes32 userOpHash, uint256 maxCost)
        external returns (bytes memory context, uint256 validationData);
        /**
         * post-operation handler.
         * Must verify sender is the entryPoint
         * @param mode enum with the following options:
         *      opSucceeded - user operation succeeded.
         *      opReverted  - user op reverted. still has to pay for gas.
         *      postOpReverted - user op succeeded, but caused postOp (in mode=opSucceeded) to revert.
         *                       Now this is the 2nd call, after user's op was deliberately reverted.
         * @param context - the context value returned by validatePaymasterUserOp
         * @param actualGasCost - actual gas used so far (without this postOp call).
         */
        function postOp(PostOpMode mode, bytes calldata context, uint256 actualGasCost) external;
    }
    // SPDX-License-Identifier: GPL-3.0-only
    pragma solidity ^0.8.12;
    /**
     * manage deposits and stakes.
     * deposit is just a balance used to pay for UserOperations (either by a paymaster or an account)
     * stake is value locked for at least "unstakeDelay" by the staked entity.
     */
    interface IStakeManager {
        event Deposited(
            address indexed account,
            uint256 totalDeposit
        );
        event Withdrawn(
            address indexed account,
            address withdrawAddress,
            uint256 amount
        );
        /// Emitted when stake or unstake delay are modified
        event StakeLocked(
            address indexed account,
            uint256 totalStaked,
            uint256 unstakeDelaySec
        );
        /// Emitted once a stake is scheduled for withdrawal
        event StakeUnlocked(
            address indexed account,
            uint256 withdrawTime
        );
        event StakeWithdrawn(
            address indexed account,
            address withdrawAddress,
            uint256 amount
        );
        /**
         * @param deposit the entity's deposit
         * @param staked true if this entity is staked.
         * @param stake actual amount of ether staked for this entity.
         * @param unstakeDelaySec minimum delay to withdraw the stake.
         * @param withdrawTime - first block timestamp where 'withdrawStake' will be callable, or zero if already locked
         * @dev sizes were chosen so that (deposit,staked, stake) fit into one cell (used during handleOps)
         *    and the rest fit into a 2nd cell.
         *    112 bit allows for 10^15 eth
         *    48 bit for full timestamp
         *    32 bit allows 150 years for unstake delay
         */
        struct DepositInfo {
            uint112 deposit;
            bool staked;
            uint112 stake;
            uint32 unstakeDelaySec;
            uint48 withdrawTime;
        }
        //API struct used by getStakeInfo and simulateValidation
        struct StakeInfo {
            uint256 stake;
            uint256 unstakeDelaySec;
        }
        /// @return info - full deposit information of given account
        function getDepositInfo(address account) external view returns (DepositInfo memory info);
        /// @return the deposit (for gas payment) of the account
        function balanceOf(address account) external view returns (uint256);
        /**
         * add to the deposit of the given account
         */
        function depositTo(address account) external payable;
        /**
         * add to the account's stake - amount and delay
         * any pending unstake is first cancelled.
         * @param _unstakeDelaySec the new lock duration before the deposit can be withdrawn.
         */
        function addStake(uint32 _unstakeDelaySec) external payable;
        /**
         * attempt to unlock the stake.
         * the value can be withdrawn (using withdrawStake) after the unstake delay.
         */
        function unlockStake() external;
        /**
         * withdraw from the (unlocked) stake.
         * must first call unlockStake and wait for the unstakeDelay to pass
         * @param withdrawAddress the address to send withdrawn value.
         */
        function withdrawStake(address payable withdrawAddress) external;
        /**
         * withdraw from the deposit.
         * @param withdrawAddress the address to send withdrawn value.
         * @param withdrawAmount the amount to withdraw.
         */
        function withdrawTo(address payable withdrawAddress, uint256 withdrawAmount) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable no-inline-assembly */
    import {calldataKeccak} from "../core/Helpers.sol";
    /**
     * User Operation struct
     * @param sender the sender account of this request.
         * @param nonce unique value the sender uses to verify it is not a replay.
         * @param initCode if set, the account contract will be created by this constructor/
         * @param callData the method call to execute on this account.
         * @param callGasLimit the gas limit passed to the callData method call.
         * @param verificationGasLimit gas used for validateUserOp and validatePaymasterUserOp.
         * @param preVerificationGas gas not calculated by the handleOps method, but added to the gas paid. Covers batch overhead.
         * @param maxFeePerGas same as EIP-1559 gas parameter.
         * @param maxPriorityFeePerGas same as EIP-1559 gas parameter.
         * @param paymasterAndData if set, this field holds the paymaster address and paymaster-specific data. the paymaster will pay for the transaction instead of the sender.
         * @param signature sender-verified signature over the entire request, the EntryPoint address and the chain ID.
         */
        struct UserOperation {
            address sender;
            uint256 nonce;
            bytes initCode;
            bytes callData;
            uint256 callGasLimit;
            uint256 verificationGasLimit;
            uint256 preVerificationGas;
            uint256 maxFeePerGas;
            uint256 maxPriorityFeePerGas;
            bytes paymasterAndData;
            bytes signature;
        }
    /**
     * Utility functions helpful when working with UserOperation structs.
     */
    library UserOperationLib {
        function getSender(UserOperation calldata userOp) internal pure returns (address) {
            address data;
            //read sender from userOp, which is first userOp member (saves 800 gas...)
            assembly {data := calldataload(userOp)}
            return address(uint160(data));
        }
        //relayer/block builder might submit the TX with higher priorityFee, but the user should not
        // pay above what he signed for.
        function gasPrice(UserOperation calldata userOp) internal view returns (uint256) {
        unchecked {
            uint256 maxFeePerGas = userOp.maxFeePerGas;
            uint256 maxPriorityFeePerGas = userOp.maxPriorityFeePerGas;
            if (maxFeePerGas == maxPriorityFeePerGas) {
                //legacy mode (for networks that don't support basefee opcode)
                return maxFeePerGas;
            }
            return min(maxFeePerGas, maxPriorityFeePerGas + block.basefee);
        }
        }
        function pack(UserOperation calldata userOp) internal pure returns (bytes memory ret) {
            address sender = getSender(userOp);
            uint256 nonce = userOp.nonce;
            bytes32 hashInitCode = calldataKeccak(userOp.initCode);
            bytes32 hashCallData = calldataKeccak(userOp.callData);
            uint256 callGasLimit = userOp.callGasLimit;
            uint256 verificationGasLimit = userOp.verificationGasLimit;
            uint256 preVerificationGas = userOp.preVerificationGas;
            uint256 maxFeePerGas = userOp.maxFeePerGas;
            uint256 maxPriorityFeePerGas = userOp.maxPriorityFeePerGas;
            bytes32 hashPaymasterAndData = calldataKeccak(userOp.paymasterAndData);
            return abi.encode(
                sender, nonce,
                hashInitCode, hashCallData,
                callGasLimit, verificationGasLimit, preVerificationGas,
                maxFeePerGas, maxPriorityFeePerGas,
                hashPaymasterAndData
            );
        }
        function hash(UserOperation calldata userOp) internal pure returns (bytes32) {
            return keccak256(pack(userOp));
        }
        function min(uint256 a, uint256 b) internal pure returns (uint256) {
            return a < b ? a : b;
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.7.0) (access/Ownable.sol)
    pragma solidity ^0.8.0;
    import "../utils/Context.sol";
    /**
     * @dev Contract module which provides a basic access control mechanism, where
     * there is an account (an owner) that can be granted exclusive access to
     * specific functions.
     *
     * By default, the owner account will be the one that deploys the contract. This
     * can later be changed with {transferOwnership}.
     *
     * This module is used through inheritance. It will make available the modifier
     * `onlyOwner`, which can be applied to your functions to restrict their use to
     * the owner.
     */
    abstract contract Ownable is Context {
        address private _owner;
        event OwnershipTransferred(address indexed previousOwner, address indexed newOwner);
        /**
         * @dev Initializes the contract setting the deployer as the initial owner.
         */
        constructor() {
            _transferOwnership(_msgSender());
        }
        /**
         * @dev Throws if called by any account other than the owner.
         */
        modifier onlyOwner() {
            _checkOwner();
            _;
        }
        /**
         * @dev Returns the address of the current owner.
         */
        function owner() public view virtual returns (address) {
            return _owner;
        }
        /**
         * @dev Throws if the sender is not the owner.
         */
        function _checkOwner() internal view virtual {
            require(owner() == _msgSender(), "Ownable: caller is not the owner");
        }
        /**
         * @dev Leaves the contract without owner. It will not be possible to call
         * `onlyOwner` functions anymore. Can only be called by the current owner.
         *
         * NOTE: Renouncing ownership will leave the contract without an owner,
         * thereby removing any functionality that is only available to the owner.
         */
        function renounceOwnership() public virtual onlyOwner {
            _transferOwnership(address(0));
        }
        /**
         * @dev Transfers ownership of the contract to a new account (`newOwner`).
         * Can only be called by the current owner.
         */
        function transferOwnership(address newOwner) public virtual onlyOwner {
            require(newOwner != address(0), "Ownable: new owner is the zero address");
            _transferOwnership(newOwner);
        }
        /**
         * @dev Transfers ownership of the contract to a new account (`newOwner`).
         * Internal function without access restriction.
         */
        function _transferOwnership(address newOwner) internal virtual {
            address oldOwner = _owner;
            _owner = newOwner;
            emit OwnershipTransferred(oldOwner, newOwner);
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.8.0) (security/ReentrancyGuard.sol)
    pragma solidity ^0.8.0;
    /**
     * @dev Contract module that helps prevent reentrant calls to a function.
     *
     * Inheriting from `ReentrancyGuard` will make the {nonReentrant} modifier
     * available, which can be applied to functions to make sure there are no nested
     * (reentrant) calls to them.
     *
     * Note that because there is a single `nonReentrant` guard, functions marked as
     * `nonReentrant` may not call one another. This can be worked around by making
     * those functions `private`, and then adding `external` `nonReentrant` entry
     * points to them.
     *
     * TIP: If you would like to learn more about reentrancy and alternative ways
     * to protect against it, check out our blog post
     * https://blog.openzeppelin.com/reentrancy-after-istanbul/[Reentrancy After Istanbul].
     */
    abstract contract ReentrancyGuard {
        // Booleans are more expensive than uint256 or any type that takes up a full
        // word because each write operation emits an extra SLOAD to first read the
        // slot's contents, replace the bits taken up by the boolean, and then write
        // back. This is the compiler's defense against contract upgrades and
        // pointer aliasing, and it cannot be disabled.
        // The values being non-zero value makes deployment a bit more expensive,
        // but in exchange the refund on every call to nonReentrant will be lower in
        // amount. Since refunds are capped to a percentage of the total
        // transaction's gas, it is best to keep them low in cases like this one, to
        // increase the likelihood of the full refund coming into effect.
        uint256 private constant _NOT_ENTERED = 1;
        uint256 private constant _ENTERED = 2;
        uint256 private _status;
        constructor() {
            _status = _NOT_ENTERED;
        }
        /**
         * @dev Prevents a contract from calling itself, directly or indirectly.
         * Calling a `nonReentrant` function from another `nonReentrant`
         * function is not supported. It is possible to prevent this from happening
         * by making the `nonReentrant` function external, and making it call a
         * `private` function that does the actual work.
         */
        modifier nonReentrant() {
            _nonReentrantBefore();
            _;
            _nonReentrantAfter();
        }
        function _nonReentrantBefore() private {
            // On the first call to nonReentrant, _status will be _NOT_ENTERED
            require(_status != _ENTERED, "ReentrancyGuard: reentrant call");
            // Any calls to nonReentrant after this point will fail
            _status = _ENTERED;
        }
        function _nonReentrantAfter() private {
            // By storing the original value once again, a refund is triggered (see
            // https://eips.ethereum.org/EIPS/eip-2200)
            _status = _NOT_ENTERED;
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts v4.4.1 (utils/Context.sol)
    pragma solidity ^0.8.0;
    /**
     * @dev Provides information about the current execution context, including the
     * sender of the transaction and its data. While these are generally available
     * via msg.sender and msg.data, they should not be accessed in such a direct
     * manner, since when dealing with meta-transactions the account sending and
     * paying for execution may not be the actual sender (as far as an application
     * is concerned).
     *
     * This contract is only required for intermediate, library-like contracts.
     */
    abstract contract Context {
        function _msgSender() internal view virtual returns (address) {
            return msg.sender;
        }
        function _msgData() internal view virtual returns (bytes calldata) {
            return msg.data;
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.8.0) (utils/cryptography/ECDSA.sol)
    pragma solidity ^0.8.0;
    import "../Strings.sol";
    /**
     * @dev Elliptic Curve Digital Signature Algorithm (ECDSA) operations.
     *
     * These functions can be used to verify that a message was signed by the holder
     * of the private keys of a given address.
     */
    library ECDSA {
        enum RecoverError {
            NoError,
            InvalidSignature,
            InvalidSignatureLength,
            InvalidSignatureS,
            InvalidSignatureV // Deprecated in v4.8
        }
        function _throwError(RecoverError error) private pure {
            if (error == RecoverError.NoError) {
                return; // no error: do nothing
            } else if (error == RecoverError.InvalidSignature) {
                revert("ECDSA: invalid signature");
            } else if (error == RecoverError.InvalidSignatureLength) {
                revert("ECDSA: invalid signature length");
            } else if (error == RecoverError.InvalidSignatureS) {
                revert("ECDSA: invalid signature 's' value");
            }
        }
        /**
         * @dev Returns the address that signed a hashed message (`hash`) with
         * `signature` or error string. This address can then be used for verification purposes.
         *
         * The `ecrecover` EVM opcode allows for malleable (non-unique) signatures:
         * this function rejects them by requiring the `s` value to be in the lower
         * half order, and the `v` value to be either 27 or 28.
         *
         * IMPORTANT: `hash` _must_ be the result of a hash operation for the
         * verification to be secure: it is possible to craft signatures that
         * recover to arbitrary addresses for non-hashed data. A safe way to ensure
         * this is by receiving a hash of the original message (which may otherwise
         * be too long), and then calling {toEthSignedMessageHash} on it.
         *
         * Documentation for signature generation:
         * - with https://web3js.readthedocs.io/en/v1.3.4/web3-eth-accounts.html#sign[Web3.js]
         * - with https://docs.ethers.io/v5/api/signer/#Signer-signMessage[ethers]
         *
         * _Available since v4.3._
         */
        function tryRecover(bytes32 hash, bytes memory signature) internal pure returns (address, RecoverError) {
            if (signature.length == 65) {
                bytes32 r;
                bytes32 s;
                uint8 v;
                // ecrecover takes the signature parameters, and the only way to get them
                // currently is to use assembly.
                /// @solidity memory-safe-assembly
                assembly {
                    r := mload(add(signature, 0x20))
                    s := mload(add(signature, 0x40))
                    v := byte(0, mload(add(signature, 0x60)))
                }
                return tryRecover(hash, v, r, s);
            } else {
                return (address(0), RecoverError.InvalidSignatureLength);
            }
        }
        /**
         * @dev Returns the address that signed a hashed message (`hash`) with
         * `signature`. This address can then be used for verification purposes.
         *
         * The `ecrecover` EVM opcode allows for malleable (non-unique) signatures:
         * this function rejects them by requiring the `s` value to be in the lower
         * half order, and the `v` value to be either 27 or 28.
         *
         * IMPORTANT: `hash` _must_ be the result of a hash operation for the
         * verification to be secure: it is possible to craft signatures that
         * recover to arbitrary addresses for non-hashed data. A safe way to ensure
         * this is by receiving a hash of the original message (which may otherwise
         * be too long), and then calling {toEthSignedMessageHash} on it.
         */
        function recover(bytes32 hash, bytes memory signature) internal pure returns (address) {
            (address recovered, RecoverError error) = tryRecover(hash, signature);
            _throwError(error);
            return recovered;
        }
        /**
         * @dev Overload of {ECDSA-tryRecover} that receives the `r` and `vs` short-signature fields separately.
         *
         * See https://eips.ethereum.org/EIPS/eip-2098[EIP-2098 short signatures]
         *
         * _Available since v4.3._
         */
        function tryRecover(
            bytes32 hash,
            bytes32 r,
            bytes32 vs
        ) internal pure returns (address, RecoverError) {
            bytes32 s = vs & bytes32(0x7fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff);
            uint8 v = uint8((uint256(vs) >> 255) + 27);
            return tryRecover(hash, v, r, s);
        }
        /**
         * @dev Overload of {ECDSA-recover} that receives the `r and `vs` short-signature fields separately.
         *
         * _Available since v4.2._
         */
        function recover(
            bytes32 hash,
            bytes32 r,
            bytes32 vs
        ) internal pure returns (address) {
            (address recovered, RecoverError error) = tryRecover(hash, r, vs);
            _throwError(error);
            return recovered;
        }
        /**
         * @dev Overload of {ECDSA-tryRecover} that receives the `v`,
         * `r` and `s` signature fields separately.
         *
         * _Available since v4.3._
         */
        function tryRecover(
            bytes32 hash,
            uint8 v,
            bytes32 r,
            bytes32 s
        ) internal pure returns (address, RecoverError) {
            // EIP-2 still allows signature malleability for ecrecover(). Remove this possibility and make the signature
            // unique. Appendix F in the Ethereum Yellow paper (https://ethereum.github.io/yellowpaper/paper.pdf), defines
            // the valid range for s in (301): 0 < s < secp256k1n ÷ 2 + 1, and for v in (302): v ∈ {27, 28}. Most
            // signatures from current libraries generate a unique signature with an s-value in the lower half order.
            //
            // If your library generates malleable signatures, such as s-values in the upper range, calculate a new s-value
            // with 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141 - s1 and flip v from 27 to 28 or
            // vice versa. If your library also generates signatures with 0/1 for v instead 27/28, add 27 to v to accept
            // these malleable signatures as well.
            if (uint256(s) > 0x7FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF5D576E7357A4501DDFE92F46681B20A0) {
                return (address(0), RecoverError.InvalidSignatureS);
            }
            // If the signature is valid (and not malleable), return the signer address
            address signer = ecrecover(hash, v, r, s);
            if (signer == address(0)) {
                return (address(0), RecoverError.InvalidSignature);
            }
            return (signer, RecoverError.NoError);
        }
        /**
         * @dev Overload of {ECDSA-recover} that receives the `v`,
         * `r` and `s` signature fields separately.
         */
        function recover(
            bytes32 hash,
            uint8 v,
            bytes32 r,
            bytes32 s
        ) internal pure returns (address) {
            (address recovered, RecoverError error) = tryRecover(hash, v, r, s);
            _throwError(error);
            return recovered;
        }
        /**
         * @dev Returns an Ethereum Signed Message, created from a `hash`. This
         * produces hash corresponding to the one signed with the
         * https://eth.wiki/json-rpc/API#eth_sign[`eth_sign`]
         * JSON-RPC method as part of EIP-191.
         *
         * See {recover}.
         */
        function toEthSignedMessageHash(bytes32 hash) internal pure returns (bytes32) {
            // 32 is the length in bytes of hash,
            // enforced by the type signature above
            return keccak256(abi.encodePacked("\\x19Ethereum Signed Message:\
    32", hash));
        }
        /**
         * @dev Returns an Ethereum Signed Message, created from `s`. This
         * produces hash corresponding to the one signed with the
         * https://eth.wiki/json-rpc/API#eth_sign[`eth_sign`]
         * JSON-RPC method as part of EIP-191.
         *
         * See {recover}.
         */
        function toEthSignedMessageHash(bytes memory s) internal pure returns (bytes32) {
            return keccak256(abi.encodePacked("\\x19Ethereum Signed Message:\
    ", Strings.toString(s.length), s));
        }
        /**
         * @dev Returns an Ethereum Signed Typed Data, created from a
         * `domainSeparator` and a `structHash`. This produces hash corresponding
         * to the one signed with the
         * https://eips.ethereum.org/EIPS/eip-712[`eth_signTypedData`]
         * JSON-RPC method as part of EIP-712.
         *
         * See {recover}.
         */
        function toTypedDataHash(bytes32 domainSeparator, bytes32 structHash) internal pure returns (bytes32) {
            return keccak256(abi.encodePacked("\\x19\\x01", domainSeparator, structHash));
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.8.0) (utils/math/Math.sol)
    pragma solidity ^0.8.0;
    /**
     * @dev Standard math utilities missing in the Solidity language.
     */
    library Math {
        enum Rounding {
            Down, // Toward negative infinity
            Up, // Toward infinity
            Zero // Toward zero
        }
        /**
         * @dev Returns the largest of two numbers.
         */
        function max(uint256 a, uint256 b) internal pure returns (uint256) {
            return a > b ? a : b;
        }
        /**
         * @dev Returns the smallest of two numbers.
         */
        function min(uint256 a, uint256 b) internal pure returns (uint256) {
            return a < b ? a : b;
        }
        /**
         * @dev Returns the average of two numbers. The result is rounded towards
         * zero.
         */
        function average(uint256 a, uint256 b) internal pure returns (uint256) {
            // (a + b) / 2 can overflow.
            return (a & b) + (a ^ b) / 2;
        }
        /**
         * @dev Returns the ceiling of the division of two numbers.
         *
         * This differs from standard division with `/` in that it rounds up instead
         * of rounding down.
         */
        function ceilDiv(uint256 a, uint256 b) internal pure returns (uint256) {
            // (a + b - 1) / b can overflow on addition, so we distribute.
            return a == 0 ? 0 : (a - 1) / b + 1;
        }
        /**
         * @notice Calculates floor(x * y / denominator) with full precision. Throws if result overflows a uint256 or denominator == 0
         * @dev Original credit to Remco Bloemen under MIT license (https://xn--2-umb.com/21/muldiv)
         * with further edits by Uniswap Labs also under MIT license.
         */
        function mulDiv(
            uint256 x,
            uint256 y,
            uint256 denominator
        ) internal pure returns (uint256 result) {
            unchecked {
                // 512-bit multiply [prod1 prod0] = x * y. Compute the product mod 2^256 and mod 2^256 - 1, then use
                // use the Chinese Remainder Theorem to reconstruct the 512 bit result. The result is stored in two 256
                // variables such that product = prod1 * 2^256 + prod0.
                uint256 prod0; // Least significant 256 bits of the product
                uint256 prod1; // Most significant 256 bits of the product
                assembly {
                    let mm := mulmod(x, y, not(0))
                    prod0 := mul(x, y)
                    prod1 := sub(sub(mm, prod0), lt(mm, prod0))
                }
                // Handle non-overflow cases, 256 by 256 division.
                if (prod1 == 0) {
                    return prod0 / denominator;
                }
                // Make sure the result is less than 2^256. Also prevents denominator == 0.
                require(denominator > prod1);
                ///////////////////////////////////////////////
                // 512 by 256 division.
                ///////////////////////////////////////////////
                // Make division exact by subtracting the remainder from [prod1 prod0].
                uint256 remainder;
                assembly {
                    // Compute remainder using mulmod.
                    remainder := mulmod(x, y, denominator)
                    // Subtract 256 bit number from 512 bit number.
                    prod1 := sub(prod1, gt(remainder, prod0))
                    prod0 := sub(prod0, remainder)
                }
                // Factor powers of two out of denominator and compute largest power of two divisor of denominator. Always >= 1.
                // See https://cs.stackexchange.com/q/138556/92363.
                // Does not overflow because the denominator cannot be zero at this stage in the function.
                uint256 twos = denominator & (~denominator + 1);
                assembly {
                    // Divide denominator by twos.
                    denominator := div(denominator, twos)
                    // Divide [prod1 prod0] by twos.
                    prod0 := div(prod0, twos)
                    // Flip twos such that it is 2^256 / twos. If twos is zero, then it becomes one.
                    twos := add(div(sub(0, twos), twos), 1)
                }
                // Shift in bits from prod1 into prod0.
                prod0 |= prod1 * twos;
                // Invert denominator mod 2^256. Now that denominator is an odd number, it has an inverse modulo 2^256 such
                // that denominator * inv = 1 mod 2^256. Compute the inverse by starting with a seed that is correct for
                // four bits. That is, denominator * inv = 1 mod 2^4.
                uint256 inverse = (3 * denominator) ^ 2;
                // Use the Newton-Raphson iteration to improve the precision. Thanks to Hensel's lifting lemma, this also works
                // in modular arithmetic, doubling the correct bits in each step.
                inverse *= 2 - denominator * inverse; // inverse mod 2^8
                inverse *= 2 - denominator * inverse; // inverse mod 2^16
                inverse *= 2 - denominator * inverse; // inverse mod 2^32
                inverse *= 2 - denominator * inverse; // inverse mod 2^64
                inverse *= 2 - denominator * inverse; // inverse mod 2^128
                inverse *= 2 - denominator * inverse; // inverse mod 2^256
                // Because the division is now exact we can divide by multiplying with the modular inverse of denominator.
                // This will give us the correct result modulo 2^256. Since the preconditions guarantee that the outcome is
                // less than 2^256, this is the final result. We don't need to compute the high bits of the result and prod1
                // is no longer required.
                result = prod0 * inverse;
                return result;
            }
        }
        /**
         * @notice Calculates x * y / denominator with full precision, following the selected rounding direction.
         */
        function mulDiv(
            uint256 x,
            uint256 y,
            uint256 denominator,
            Rounding rounding
        ) internal pure returns (uint256) {
            uint256 result = mulDiv(x, y, denominator);
            if (rounding == Rounding.Up && mulmod(x, y, denominator) > 0) {
                result += 1;
            }
            return result;
        }
        /**
         * @dev Returns the square root of a number. If the number is not a perfect square, the value is rounded down.
         *
         * Inspired by Henry S. Warren, Jr.'s "Hacker's Delight" (Chapter 11).
         */
        function sqrt(uint256 a) internal pure returns (uint256) {
            if (a == 0) {
                return 0;
            }
            // For our first guess, we get the biggest power of 2 which is smaller than the square root of the target.
            //
            // We know that the "msb" (most significant bit) of our target number `a` is a power of 2 such that we have
            // `msb(a) <= a < 2*msb(a)`. This value can be written `msb(a)=2**k` with `k=log2(a)`.
            //
            // This can be rewritten `2**log2(a) <= a < 2**(log2(a) + 1)`
            // → `sqrt(2**k) <= sqrt(a) < sqrt(2**(k+1))`
            // → `2**(k/2) <= sqrt(a) < 2**((k+1)/2) <= 2**(k/2 + 1)`
            //
            // Consequently, `2**(log2(a) / 2)` is a good first approximation of `sqrt(a)` with at least 1 correct bit.
            uint256 result = 1 << (log2(a) >> 1);
            // At this point `result` is an estimation with one bit of precision. We know the true value is a uint128,
            // since it is the square root of a uint256. Newton's method converges quadratically (precision doubles at
            // every iteration). We thus need at most 7 iteration to turn our partial result with one bit of precision
            // into the expected uint128 result.
            unchecked {
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                result = (result + a / result) >> 1;
                return min(result, a / result);
            }
        }
        /**
         * @notice Calculates sqrt(a), following the selected rounding direction.
         */
        function sqrt(uint256 a, Rounding rounding) internal pure returns (uint256) {
            unchecked {
                uint256 result = sqrt(a);
                return result + (rounding == Rounding.Up && result * result < a ? 1 : 0);
            }
        }
        /**
         * @dev Return the log in base 2, rounded down, of a positive value.
         * Returns 0 if given 0.
         */
        function log2(uint256 value) internal pure returns (uint256) {
            uint256 result = 0;
            unchecked {
                if (value >> 128 > 0) {
                    value >>= 128;
                    result += 128;
                }
                if (value >> 64 > 0) {
                    value >>= 64;
                    result += 64;
                }
                if (value >> 32 > 0) {
                    value >>= 32;
                    result += 32;
                }
                if (value >> 16 > 0) {
                    value >>= 16;
                    result += 16;
                }
                if (value >> 8 > 0) {
                    value >>= 8;
                    result += 8;
                }
                if (value >> 4 > 0) {
                    value >>= 4;
                    result += 4;
                }
                if (value >> 2 > 0) {
                    value >>= 2;
                    result += 2;
                }
                if (value >> 1 > 0) {
                    result += 1;
                }
            }
            return result;
        }
        /**
         * @dev Return the log in base 2, following the selected rounding direction, of a positive value.
         * Returns 0 if given 0.
         */
        function log2(uint256 value, Rounding rounding) internal pure returns (uint256) {
            unchecked {
                uint256 result = log2(value);
                return result + (rounding == Rounding.Up && 1 << result < value ? 1 : 0);
            }
        }
        /**
         * @dev Return the log in base 10, rounded down, of a positive value.
         * Returns 0 if given 0.
         */
        function log10(uint256 value) internal pure returns (uint256) {
            uint256 result = 0;
            unchecked {
                if (value >= 10**64) {
                    value /= 10**64;
                    result += 64;
                }
                if (value >= 10**32) {
                    value /= 10**32;
                    result += 32;
                }
                if (value >= 10**16) {
                    value /= 10**16;
                    result += 16;
                }
                if (value >= 10**8) {
                    value /= 10**8;
                    result += 8;
                }
                if (value >= 10**4) {
                    value /= 10**4;
                    result += 4;
                }
                if (value >= 10**2) {
                    value /= 10**2;
                    result += 2;
                }
                if (value >= 10**1) {
                    result += 1;
                }
            }
            return result;
        }
        /**
         * @dev Return the log in base 10, following the selected rounding direction, of a positive value.
         * Returns 0 if given 0.
         */
        function log10(uint256 value, Rounding rounding) internal pure returns (uint256) {
            unchecked {
                uint256 result = log10(value);
                return result + (rounding == Rounding.Up && 10**result < value ? 1 : 0);
            }
        }
        /**
         * @dev Return the log in base 256, rounded down, of a positive value.
         * Returns 0 if given 0.
         *
         * Adding one to the result gives the number of pairs of hex symbols needed to represent `value` as a hex string.
         */
        function log256(uint256 value) internal pure returns (uint256) {
            uint256 result = 0;
            unchecked {
                if (value >> 128 > 0) {
                    value >>= 128;
                    result += 16;
                }
                if (value >> 64 > 0) {
                    value >>= 64;
                    result += 8;
                }
                if (value >> 32 > 0) {
                    value >>= 32;
                    result += 4;
                }
                if (value >> 16 > 0) {
                    value >>= 16;
                    result += 2;
                }
                if (value >> 8 > 0) {
                    result += 1;
                }
            }
            return result;
        }
        /**
         * @dev Return the log in base 10, following the selected rounding direction, of a positive value.
         * Returns 0 if given 0.
         */
        function log256(uint256 value, Rounding rounding) internal pure returns (uint256) {
            unchecked {
                uint256 result = log256(value);
                return result + (rounding == Rounding.Up && 1 << (result * 8) < value ? 1 : 0);
            }
        }
    }
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.8.0) (utils/Strings.sol)
    pragma solidity ^0.8.0;
    import "./math/Math.sol";
    /**
     * @dev String operations.
     */
    library Strings {
        bytes16 private constant _SYMBOLS = "0123456789abcdef";
        uint8 private constant _ADDRESS_LENGTH = 20;
        /**
         * @dev Converts a `uint256` to its ASCII `string` decimal representation.
         */
        function toString(uint256 value) internal pure returns (string memory) {
            unchecked {
                uint256 length = Math.log10(value) + 1;
                string memory buffer = new string(length);
                uint256 ptr;
                /// @solidity memory-safe-assembly
                assembly {
                    ptr := add(buffer, add(32, length))
                }
                while (true) {
                    ptr--;
                    /// @solidity memory-safe-assembly
                    assembly {
                        mstore8(ptr, byte(mod(value, 10), _SYMBOLS))
                    }
                    value /= 10;
                    if (value == 0) break;
                }
                return buffer;
            }
        }
        /**
         * @dev Converts a `uint256` to its ASCII `string` hexadecimal representation.
         */
        function toHexString(uint256 value) internal pure returns (string memory) {
            unchecked {
                return toHexString(value, Math.log256(value) + 1);
            }
        }
        /**
         * @dev Converts a `uint256` to its ASCII `string` hexadecimal representation with fixed length.
         */
        function toHexString(uint256 value, uint256 length) internal pure returns (string memory) {
            bytes memory buffer = new bytes(2 * length + 2);
            buffer[0] = "0";
            buffer[1] = "x";
            for (uint256 i = 2 * length + 1; i > 1; --i) {
                buffer[i] = _SYMBOLS[value & 0xf];
                value >>= 4;
            }
            require(value == 0, "Strings: hex length insufficient");
            return string(buffer);
        }
        /**
         * @dev Converts an `address` with fixed length of 20 bytes to its not checksummed ASCII `string` hexadecimal representation.
         */
        function toHexString(address addr) internal pure returns (string memory) {
            return toHexString(uint256(uint160(addr)), _ADDRESS_LENGTH);
        }
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity 0.8.17;
    /* solhint-disable reason-string */
    import {Ownable} from "@openzeppelin/contracts/access/Ownable.sol";
    import {IPaymaster} from "@account-abstraction/contracts/interfaces/IPaymaster.sol";
    import {IEntryPoint} from "@account-abstraction/contracts/interfaces/IEntryPoint.sol";
    import {UserOperation, UserOperationLib} from "@account-abstraction/contracts/interfaces/UserOperation.sol";
    import "@account-abstraction/contracts/core/Helpers.sol";
    // can import specific revert errors as per need
    /**
     * Helper class for creating a paymaster.
     * provides helper methods for staking.
     * validates that the postOp is called only by the entryPoint
     */
    // @notice Could have Ownable2Step
    abstract contract BasePaymaster is IPaymaster, Ownable {
        IEntryPoint public immutable entryPoint;
        constructor(address _owner, IEntryPoint _entryPoint) {
            entryPoint = _entryPoint;
            _transferOwnership(_owner);
        }
        /// @inheritdoc IPaymaster
        function validatePaymasterUserOp(
            UserOperation calldata userOp,
            bytes32 userOpHash,
            uint256 maxCost
        ) external override returns (bytes memory context, uint256 validationData) {
            _requireFromEntryPoint();
            return _validatePaymasterUserOp(userOp, userOpHash, maxCost);
        }
        function _validatePaymasterUserOp(
            UserOperation calldata userOp,
            bytes32 userOpHash,
            uint256 maxCost
        ) internal virtual returns (bytes memory context, uint256 validationData);
        /// @inheritdoc IPaymaster
        function postOp(
            PostOpMode mode,
            bytes calldata context,
            uint256 actualGasCost
        ) external override {
            _requireFromEntryPoint();
            _postOp(mode, context, actualGasCost);
        }
        /**
         * post-operation handler.
         * (verified to be called only through the entryPoint)
         * @dev if subclass returns a non-empty context from validatePaymasterUserOp, it must also implement this method.
         * @param mode enum with the following options:
         *      opSucceeded - user operation succeeded.
         *      opReverted  - user op reverted. still has to pay for gas.
         *      postOpReverted - user op succeeded, but caused postOp (in mode=opSucceeded) to revert.
         *                       Now this is the 2nd call, after user's op was deliberately reverted.
         * @param context - the context value returned by validatePaymasterUserOp
         * @param actualGasCost - actual gas used so far (without this postOp call).
         */
        function _postOp(
            PostOpMode mode,
            bytes calldata context,
            uint256 actualGasCost
        ) internal virtual {
            (mode, context, actualGasCost); // unused params
            // subclass must override this method if validatePaymasterUserOp returns a context
            revert("must override");
        }
        /**
         * add a deposit for this paymaster, used for paying for transaction fees
         */
        function deposit() external payable virtual;
        /**
         * withdraw value from the deposit
         * @param withdrawAddress target to send to
         * @param amount to withdraw
         */
        function withdrawTo(
            address payable withdrawAddress,
            uint256 amount
        ) external virtual;
        /**
         * add stake for this paymaster.
         * This method can also carry eth value to add to the current stake.
         * @param unstakeDelaySec - the unstake delay for this paymaster. Can only be increased.
         */
        function addStake(uint32 unstakeDelaySec) external payable onlyOwner {
            entryPoint.addStake{value: msg.value}(unstakeDelaySec);
        }
        /**
         * return current paymaster's deposit on the entryPoint.
         */
        function getDeposit() public view returns (uint256) {
            return entryPoint.balanceOf(address(this));
        }
        /**
         * unlock the stake, in order to withdraw it.
         * The paymaster can't serve requests once unlocked, until it calls addStake again
         */
        function unlockStake() external onlyOwner {
            entryPoint.unlockStake();
        }
        /**
         * withdraw the entire paymaster's stake.
         * stake must be unlocked first (and then wait for the unstakeDelay to be over)
         * @param withdrawAddress the address to send withdrawn value.
         */
        function withdrawStake(address payable withdrawAddress) external onlyOwner {
            entryPoint.withdrawStake(withdrawAddress);
        }
        /// validate the call is made from a valid entrypoint
        function _requireFromEntryPoint() internal virtual {
            require(msg.sender == address(entryPoint), "Sender not EntryPoint");
        }
    }
    // SPDX-License-Identifier: LGPL-3.0-only
    pragma solidity 0.8.17;
    contract BasePaymasterErrors {
        /**
         * @notice Throws at onlyEntryPoint when msg.sender is not an EntryPoint set for this paymaster
         * @param caller address that tried to call protected method
         */
        error CallerIsNotAnEntryPoint(address caller);
    }
    contract VerifyingPaymasterErrors {
        /**
         * @notice Throws when the Entrypoint address provided is address(0)
         */
        error EntryPointCannotBeZero();
        /**
         * @notice Throws when the verifiying signer address provided is address(0)
         */
        error VerifyingSignerCannotBeZero();
        /**
         * @notice Throws when the paymaster address provided is address(0)
         */
        error PaymasterIdCannotBeZero();
        /**
         * @notice Throws when the 0 has been provided as deposit
         */
        error DepositCanNotBeZero();
        /**
         * @notice Throws when trying to withdraw to address(0)
         */
        error CanNotWithdrawToZeroAddress();
        /**
         * @notice Throws when trying to withdraw more than balance available
         * @param amountRequired required balance
         * @param currentBalance available balance
         */
        error InsufficientBalance(uint256 amountRequired, uint256 currentBalance);
        /**
         * @notice Throws when signature provided has invalid length
         * @param sigLength length oif the signature provided
         */
        error InvalidPaymasterSignatureLength(uint256 sigLength);
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity 0.8.17;
    import {ECDSA} from "@openzeppelin/contracts/utils/cryptography/ECDSA.sol";
    import {UserOperation} from "@account-abstraction/contracts/interfaces/UserOperation.sol";
    struct PaymasterData {
        address paymasterId;
        uint48 validUntil;
        uint48 validAfter;
        bytes signature;
        uint256 signatureLength;
    }
    struct PaymasterContext {
        address paymasterId;
        uint256 maxFeePerGas;
        uint256 maxPriorityFeePerGas;
    }
    /**
     * @title PaymasterHelpers - helper functions for paymasters
     */
    library PaymasterHelpers {
        using ECDSA for bytes32;
        /**
         * @dev Encodes the paymaster context: paymasterId and gasPrice
         * @param op UserOperation object
         * @param data PaymasterData passed
         */
        function paymasterContext(
            UserOperation calldata op,
            PaymasterData memory data,
            uint256 maxFeePerGas,
            uint256 maxPriorityFeePerGas
        ) internal pure returns (bytes memory context) {
            return abi.encode(data.paymasterId, maxFeePerGas, maxPriorityFeePerGas);
        }
        /**
         * @dev Decodes paymaster data assuming it follows PaymasterData
         */
        function _decodePaymasterData(
            UserOperation calldata op
        ) internal pure returns (PaymasterData memory) {
            bytes calldata paymasterAndData = op.paymasterAndData;
            (
                address paymasterId,
                uint48 validUntil,
                uint48 validAfter,
                bytes memory signature
            ) = abi.decode(paymasterAndData[20:], (address, uint48, uint48, bytes));
            return
                PaymasterData(
                    paymasterId,
                    validUntil,
                    validAfter,
                    signature,
                    signature.length
                );
        }
        /**
         * @dev Decodes paymaster context assuming it follows PaymasterContext
         */
        function _decodePaymasterContext(
            bytes memory context
        ) internal pure returns (PaymasterContext memory) {
            (
                address paymasterId,
                uint256 maxFeePerGas,
                uint256 maxPriorityFeePerGas
            ) = abi.decode(context, (address, uint256, uint256));
            return
                PaymasterContext(paymasterId, maxFeePerGas, maxPriorityFeePerGas);
        }
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity 0.8.17;
    /* solhint-disable reason-string */
    /* solhint-disable no-inline-assembly */
    import {ECDSA} from "@openzeppelin/contracts/utils/cryptography/ECDSA.sol";
    import {ReentrancyGuard} from "@openzeppelin/contracts/security/ReentrancyGuard.sol";
    import {UserOperation, UserOperationLib} from "@account-abstraction/contracts/interfaces/UserOperation.sol";
    import "../BasePaymaster.sol";
    import {PaymasterHelpers, PaymasterData, PaymasterContext} from "./PaymasterHelpers.sol";
    import {VerifyingPaymasterErrors} from "../common/Errors.sol";
    /**
     * @title A sample paymaster that uses external service to decide whether to pay for the UserOp.
     * @dev The paymaster trusts an external signer to sign the transaction.
     * The calling user must pass the UserOp to that external signer first, which performs whatever
     * off-chain verification before signing the UserOp.
     * @notice That this signature is NOT a replacement for wallet signature:
     *  - The paymaster signs to agree to PAY for GAS.
     *  - The wallet signs to prove identity and wallet ownership.
     */
    contract VerifyingSingletonPaymaster is
        BasePaymaster,
        ReentrancyGuard,
        VerifyingPaymasterErrors
    {
        using ECDSA for bytes32;
        using UserOperationLib for UserOperation;
        using PaymasterHelpers for UserOperation;
        using PaymasterHelpers for bytes;
        using PaymasterHelpers for PaymasterData;
        // Gas used in EntryPoint._handlePostOp() method (including this#postOp() call)
        uint256 private unaccountedEPGasOverhead;
        mapping(address => uint256) public paymasterIdBalances;
        address public verifyingSigner;
        event EPGasOverheadChanged(
            uint256 indexed _oldValue,
            uint256 indexed _newValue
        );
        event VerifyingSignerChanged(
            address indexed _oldSigner,
            address indexed _newSigner,
            address indexed _actor
        );
        event GasDeposited(address indexed _paymasterId, uint256 indexed _value);
        event GasWithdrawn(
            address indexed _paymasterId,
            address indexed _to,
            uint256 indexed _value
        );
        event GasBalanceDeducted(
            address indexed _paymasterId,
            uint256 indexed _charge
        );
        constructor(
            address _owner,
            IEntryPoint _entryPoint,
            address _verifyingSigner
        ) payable BasePaymaster(_owner, _entryPoint) {
            if (address(_entryPoint) == address(0)) revert EntryPointCannotBeZero();
            if (_verifyingSigner == address(0))
                revert VerifyingSignerCannotBeZero();
            assembly {
                sstore(verifyingSigner.slot, _verifyingSigner)
            }
            unaccountedEPGasOverhead = 12000;
        }
        /**
         * @dev Add a deposit for this paymaster and given paymasterId (Dapp Depositor address), used for paying for transaction fees
         * @param paymasterId dapp identifier for which deposit is being made
         */
        function depositFor(address paymasterId) external payable nonReentrant {
            if (paymasterId == address(0)) revert PaymasterIdCannotBeZero();
            if (msg.value == 0) revert DepositCanNotBeZero();
            paymasterIdBalances[paymasterId] =
                paymasterIdBalances[paymasterId] +
                msg.value;
            entryPoint.depositTo{value: msg.value}(address(this));
            emit GasDeposited(paymasterId, msg.value);
        }
        /**
         * @dev get the current deposit for paymasterId (Dapp Depositor address)
         * @param paymasterId dapp identifier
         */
        function getBalance(
            address paymasterId
        ) external view returns (uint256 balance) {
            balance = paymasterIdBalances[paymasterId];
        }
        /**
         @dev Override the default implementation.
         */
        function deposit() public payable virtual override {
            revert("user DepositFor instead");
        }
        /**
         * @dev Withdraws the specified amount of gas tokens from the paymaster's balance and transfers them to the specified address.
         * @param withdrawAddress The address to which the gas tokens should be transferred.
         * @param amount The amount of gas tokens to withdraw.
         */
        function withdrawTo(
            address payable withdrawAddress,
            uint256 amount
        ) public override nonReentrant {
            if (withdrawAddress == address(0)) revert CanNotWithdrawToZeroAddress();
            uint256 currentBalance = paymasterIdBalances[msg.sender];
            if (amount > currentBalance)
                revert InsufficientBalance(amount, currentBalance);
            paymasterIdBalances[msg.sender] =
                paymasterIdBalances[msg.sender] -
                amount;
            entryPoint.withdrawTo(withdrawAddress, amount);
            emit GasWithdrawn(msg.sender, withdrawAddress, amount);
        }
        /**
         * @dev Set a new verifying signer address.
         * Can only be called by the owner of the contract.
         * @param _newVerifyingSigner The new address to be set as the verifying signer.
         * @notice If _newVerifyingSigner is set to zero address, it will revert with an error.
         * After setting the new signer address, it will emit an event VerifyingSignerChanged.
         */
        function setSigner(address _newVerifyingSigner) external payable onlyOwner {
            if (_newVerifyingSigner == address(0))
                revert VerifyingSignerCannotBeZero();
            address oldSigner = verifyingSigner;
            assembly {
                sstore(verifyingSigner.slot, _newVerifyingSigner)
            }
            emit VerifyingSignerChanged(oldSigner, _newVerifyingSigner, msg.sender);
        }
        function setUnaccountedEPGasOverhead(uint256 value) external onlyOwner {
            uint256 oldValue = unaccountedEPGasOverhead;
            unaccountedEPGasOverhead = value;
            emit EPGasOverheadChanged(oldValue, value);
        }
        /**
         * @dev This method is called by the off-chain service, to sign the request.
         * It is called on-chain from the validatePaymasterUserOp, to validate the signature.
         * @notice That this signature covers all fields of the UserOperation, except the "paymasterAndData",
         * which will carry the signature itself.
         * @return hash we're going to sign off-chain (and validate on-chain)
         */
        function getHash(
            UserOperation calldata userOp,
            address paymasterId,
            uint48 validUntil,
            uint48 validAfter
        ) public view returns (bytes32) {
            //can't use userOp.hash(), since it contains also the paymasterAndData itself.
            address sender = userOp.getSender();
            return
                keccak256(
                    abi.encode(
                        sender,
                        userOp.nonce,
                        keccak256(userOp.initCode),
                        keccak256(userOp.callData),
                        userOp.callGasLimit,
                        userOp.verificationGasLimit,
                        userOp.preVerificationGas,
                        userOp.maxFeePerGas,
                        userOp.maxPriorityFeePerGas,
                        block.chainid,
                        address(this),
                        paymasterId,
                        validUntil,
                        validAfter
                    )
                );
        }
        /**
         * @dev Verify that an external signer signed the paymaster data of a user operation.
         * The paymaster data is expected to be the paymaster and a signature over the entire request parameters.
         * @param userOp The UserOperation struct that represents the current user operation.
         * userOpHash The hash of the UserOperation struct.
         * @param requiredPreFund The required amount of pre-funding for the paymaster.
         * @return context A context string returned by the entry point after successful validation.
         * @return validationData An integer returned by the entry point after successful validation.
         */
        function _validatePaymasterUserOp(
            UserOperation calldata userOp,
            bytes32 /*userOpHash*/,
            uint256 requiredPreFund
        ) internal override returns (bytes memory context, uint256 validationData) {
            PaymasterData memory paymasterData = userOp._decodePaymasterData();
            bytes32 hash = getHash(
                userOp,
                paymasterData.paymasterId,
                paymasterData.validUntil,
                paymasterData.validAfter
            );
            uint256 sigLength = paymasterData.signatureLength;
            // we only "require" it here so that the revert reason on invalid signature will be of "VerifyingPaymaster", and not "ECDSA"
            if (sigLength != 65) revert InvalidPaymasterSignatureLength(sigLength);
            //don't revert on signature failure: return SIG_VALIDATION_FAILED
            if (
                verifyingSigner !=
                hash.toEthSignedMessageHash().recover(paymasterData.signature)
            ) {
                // empty context and sigFailed with time range provided
                return (
                    "",
                    _packValidationData(
                        true,
                        paymasterData.validUntil,
                        paymasterData.validAfter
                    )
                );
            }
            if (requiredPreFund > paymasterIdBalances[paymasterData.paymasterId])
                revert InsufficientBalance(
                    requiredPreFund,
                    paymasterIdBalances[paymasterData.paymasterId]
                );
            return (
                userOp.paymasterContext(
                    paymasterData,
                    userOp.maxFeePerGas,
                    userOp.maxPriorityFeePerGas
                ),
                _packValidationData(
                    false,
                    paymasterData.validUntil,
                    paymasterData.validAfter
                )
            );
        }
        function getGasPrice(
            uint256 maxFeePerGas,
            uint256 maxPriorityFeePerGas
        ) internal view returns (uint256) {
            if (maxFeePerGas == maxPriorityFeePerGas) {
                //legacy mode (for networks that don't support basefee opcode)
                return maxFeePerGas;
            }
            return min(maxFeePerGas, maxPriorityFeePerGas + block.basefee);
        }
        function min(uint256 a, uint256 b) internal pure returns (uint256) {
            return a < b ? a : b;
        }
        /**
         * @dev Executes the paymaster's payment conditions
         * @param mode tells whether the op succeeded, reverted, or if the op succeeded but cause the postOp to revert
         * @param context payment conditions signed by the paymaster in `validatePaymasterUserOp`
         * @param actualGasCost amount to be paid to the entry point in wei
         */
        function _postOp(
            PostOpMode mode,
            bytes calldata context,
            uint256 actualGasCost
        ) internal virtual override {
            PaymasterContext memory data = context._decodePaymasterContext();
            address extractedPaymasterId = data.paymasterId;
            uint256 effectiveGasPrice = getGasPrice(
                data.maxFeePerGas,
                data.maxPriorityFeePerGas
            );
            uint256 balToDeduct = actualGasCost +
                unaccountedEPGasOverhead *
                effectiveGasPrice;
            paymasterIdBalances[extractedPaymasterId] =
                paymasterIdBalances[extractedPaymasterId] -
                balToDeduct;
            emit GasBalanceDeducted(extractedPaymasterId, balToDeduct);
        }
    }
    

    File 2 of 2: EntryPoint
    // SPDX-License-Identifier: MIT
    // OpenZeppelin Contracts (last updated v4.8.0) (security/ReentrancyGuard.sol)
    pragma solidity ^0.8.0;
    /**
     * @dev Contract module that helps prevent reentrant calls to a function.
     *
     * Inheriting from `ReentrancyGuard` will make the {nonReentrant} modifier
     * available, which can be applied to functions to make sure there are no nested
     * (reentrant) calls to them.
     *
     * Note that because there is a single `nonReentrant` guard, functions marked as
     * `nonReentrant` may not call one another. This can be worked around by making
     * those functions `private`, and then adding `external` `nonReentrant` entry
     * points to them.
     *
     * TIP: If you would like to learn more about reentrancy and alternative ways
     * to protect against it, check out our blog post
     * https://blog.openzeppelin.com/reentrancy-after-istanbul/[Reentrancy After Istanbul].
     */
    abstract contract ReentrancyGuard {
        // Booleans are more expensive than uint256 or any type that takes up a full
        // word because each write operation emits an extra SLOAD to first read the
        // slot's contents, replace the bits taken up by the boolean, and then write
        // back. This is the compiler's defense against contract upgrades and
        // pointer aliasing, and it cannot be disabled.
        // The values being non-zero value makes deployment a bit more expensive,
        // but in exchange the refund on every call to nonReentrant will be lower in
        // amount. Since refunds are capped to a percentage of the total
        // transaction's gas, it is best to keep them low in cases like this one, to
        // increase the likelihood of the full refund coming into effect.
        uint256 private constant _NOT_ENTERED = 1;
        uint256 private constant _ENTERED = 2;
        uint256 private _status;
        constructor() {
            _status = _NOT_ENTERED;
        }
        /**
         * @dev Prevents a contract from calling itself, directly or indirectly.
         * Calling a `nonReentrant` function from another `nonReentrant`
         * function is not supported. It is possible to prevent this from happening
         * by making the `nonReentrant` function external, and making it call a
         * `private` function that does the actual work.
         */
        modifier nonReentrant() {
            _nonReentrantBefore();
            _;
            _nonReentrantAfter();
        }
        function _nonReentrantBefore() private {
            // On the first call to nonReentrant, _status will be _NOT_ENTERED
            require(_status != _ENTERED, "ReentrancyGuard: reentrant call");
            // Any calls to nonReentrant after this point will fail
            _status = _ENTERED;
        }
        function _nonReentrantAfter() private {
            // By storing the original value once again, a refund is triggered (see
            // https://eips.ethereum.org/EIPS/eip-2200)
            _status = _NOT_ENTERED;
        }
    }
    /**
     ** Account-Abstraction (EIP-4337) singleton EntryPoint implementation.
     ** Only one instance required on each chain.
     **/
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable avoid-low-level-calls */
    /* solhint-disable no-inline-assembly */
    import "../interfaces/IAccount.sol";
    import "../interfaces/IPaymaster.sol";
    import "../interfaces/IEntryPoint.sol";
    import "../utils/Exec.sol";
    import "./StakeManager.sol";
    import "./SenderCreator.sol";
    import "./Helpers.sol";
    import "./NonceManager.sol";
    import "@openzeppelin/contracts/security/ReentrancyGuard.sol";
    contract EntryPoint is IEntryPoint, StakeManager, NonceManager, ReentrancyGuard {
        using UserOperationLib for UserOperation;
        SenderCreator private immutable senderCreator = new SenderCreator();
        // internal value used during simulation: need to query aggregator.
        address private constant SIMULATE_FIND_AGGREGATOR = address(1);
        // marker for inner call revert on out of gas
        bytes32 private constant INNER_OUT_OF_GAS = hex'deaddead';
        uint256 private constant REVERT_REASON_MAX_LEN = 2048;
        /**
         * for simulation purposes, validateUserOp (and validatePaymasterUserOp) must return this value
         * in case of signature failure, instead of revert.
         */
        uint256 public constant SIG_VALIDATION_FAILED = 1;
        /**
         * compensate the caller's beneficiary address with the collected fees of all UserOperations.
         * @param beneficiary the address to receive the fees
         * @param amount amount to transfer.
         */
        function _compensate(address payable beneficiary, uint256 amount) internal {
            require(beneficiary != address(0), "AA90 invalid beneficiary");
            (bool success,) = beneficiary.call{value : amount}("");
            require(success, "AA91 failed send to beneficiary");
        }
        /**
         * execute a user op
         * @param opIndex index into the opInfo array
         * @param userOp the userOp to execute
         * @param opInfo the opInfo filled by validatePrepayment for this userOp.
         * @return collected the total amount this userOp paid.
         */
        function _executeUserOp(uint256 opIndex, UserOperation calldata userOp, UserOpInfo memory opInfo) private returns (uint256 collected) {
            uint256 preGas = gasleft();
            bytes memory context = getMemoryBytesFromOffset(opInfo.contextOffset);
            try this.innerHandleOp(userOp.callData, opInfo, context) returns (uint256 _actualGasCost) {
                collected = _actualGasCost;
            } catch {
                bytes32 innerRevertCode;
                assembly {
                    returndatacopy(0, 0, 32)
                    innerRevertCode := mload(0)
                }
                // handleOps was called with gas limit too low. abort entire bundle.
                if (innerRevertCode == INNER_OUT_OF_GAS) {
                    //report paymaster, since if it is not deliberately caused by the bundler,
                    // it must be a revert caused by paymaster.
                    revert FailedOp(opIndex, "AA95 out of gas");
                }
                uint256 actualGas = preGas - gasleft() + opInfo.preOpGas;
                collected = _handlePostOp(opIndex, IPaymaster.PostOpMode.postOpReverted, opInfo, context, actualGas);
            }
        }
        /**
         * Execute a batch of UserOperations.
         * no signature aggregator is used.
         * if any account requires an aggregator (that is, it returned an aggregator when
         * performing simulateValidation), then handleAggregatedOps() must be used instead.
         * @param ops the operations to execute
         * @param beneficiary the address to receive the fees
         */
        function handleOps(UserOperation[] calldata ops, address payable beneficiary) public nonReentrant {
            uint256 opslen = ops.length;
            UserOpInfo[] memory opInfos = new UserOpInfo[](opslen);
        unchecked {
            for (uint256 i = 0; i < opslen; i++) {
                UserOpInfo memory opInfo = opInfos[i];
                (uint256 validationData, uint256 pmValidationData) = _validatePrepayment(i, ops[i], opInfo);
                _validateAccountAndPaymasterValidationData(i, validationData, pmValidationData, address(0));
            }
            uint256 collected = 0;
            emit BeforeExecution();
            for (uint256 i = 0; i < opslen; i++) {
                collected += _executeUserOp(i, ops[i], opInfos[i]);
            }
            _compensate(beneficiary, collected);
        } //unchecked
        }
        /**
         * Execute a batch of UserOperation with Aggregators
         * @param opsPerAggregator the operations to execute, grouped by aggregator (or address(0) for no-aggregator accounts)
         * @param beneficiary the address to receive the fees
         */
        function handleAggregatedOps(
            UserOpsPerAggregator[] calldata opsPerAggregator,
            address payable beneficiary
        ) public nonReentrant {
            uint256 opasLen = opsPerAggregator.length;
            uint256 totalOps = 0;
            for (uint256 i = 0; i < opasLen; i++) {
                UserOpsPerAggregator calldata opa = opsPerAggregator[i];
                UserOperation[] calldata ops = opa.userOps;
                IAggregator aggregator = opa.aggregator;
                //address(1) is special marker of "signature error"
                require(address(aggregator) != address(1), "AA96 invalid aggregator");
                if (address(aggregator) != address(0)) {
                    // solhint-disable-next-line no-empty-blocks
                    try aggregator.validateSignatures(ops, opa.signature) {}
                    catch {
                        revert SignatureValidationFailed(address(aggregator));
                    }
                }
                totalOps += ops.length;
            }
            UserOpInfo[] memory opInfos = new UserOpInfo[](totalOps);
            emit BeforeExecution();
            uint256 opIndex = 0;
            for (uint256 a = 0; a < opasLen; a++) {
                UserOpsPerAggregator calldata opa = opsPerAggregator[a];
                UserOperation[] calldata ops = opa.userOps;
                IAggregator aggregator = opa.aggregator;
                uint256 opslen = ops.length;
                for (uint256 i = 0; i < opslen; i++) {
                    UserOpInfo memory opInfo = opInfos[opIndex];
                    (uint256 validationData, uint256 paymasterValidationData) = _validatePrepayment(opIndex, ops[i], opInfo);
                    _validateAccountAndPaymasterValidationData(i, validationData, paymasterValidationData, address(aggregator));
                    opIndex++;
                }
            }
            uint256 collected = 0;
            opIndex = 0;
            for (uint256 a = 0; a < opasLen; a++) {
                UserOpsPerAggregator calldata opa = opsPerAggregator[a];
                emit SignatureAggregatorChanged(address(opa.aggregator));
                UserOperation[] calldata ops = opa.userOps;
                uint256 opslen = ops.length;
                for (uint256 i = 0; i < opslen; i++) {
                    collected += _executeUserOp(opIndex, ops[i], opInfos[opIndex]);
                    opIndex++;
                }
            }
            emit SignatureAggregatorChanged(address(0));
            _compensate(beneficiary, collected);
        }
        /// @inheritdoc IEntryPoint
        function simulateHandleOp(UserOperation calldata op, address target, bytes calldata targetCallData) external override {
            UserOpInfo memory opInfo;
            _simulationOnlyValidations(op);
            (uint256 validationData, uint256 paymasterValidationData) = _validatePrepayment(0, op, opInfo);
            ValidationData memory data = _intersectTimeRange(validationData, paymasterValidationData);
            numberMarker();
            uint256 paid = _executeUserOp(0, op, opInfo);
            numberMarker();
            bool targetSuccess;
            bytes memory targetResult;
            if (target != address(0)) {
                (targetSuccess, targetResult) = target.call(targetCallData);
            }
            revert ExecutionResult(opInfo.preOpGas, paid, data.validAfter, data.validUntil, targetSuccess, targetResult);
        }
        // A memory copy of UserOp static fields only.
        // Excluding: callData, initCode and signature. Replacing paymasterAndData with paymaster.
        struct MemoryUserOp {
            address sender;
            uint256 nonce;
            uint256 callGasLimit;
            uint256 verificationGasLimit;
            uint256 preVerificationGas;
            address paymaster;
            uint256 maxFeePerGas;
            uint256 maxPriorityFeePerGas;
        }
        struct UserOpInfo {
            MemoryUserOp mUserOp;
            bytes32 userOpHash;
            uint256 prefund;
            uint256 contextOffset;
            uint256 preOpGas;
        }
        /**
         * inner function to handle a UserOperation.
         * Must be declared "external" to open a call context, but it can only be called by handleOps.
         */
        function innerHandleOp(bytes memory callData, UserOpInfo memory opInfo, bytes calldata context) external returns (uint256 actualGasCost) {
            uint256 preGas = gasleft();
            require(msg.sender == address(this), "AA92 internal call only");
            MemoryUserOp memory mUserOp = opInfo.mUserOp;
            uint callGasLimit = mUserOp.callGasLimit;
        unchecked {
            // handleOps was called with gas limit too low. abort entire bundle.
            if (gasleft() < callGasLimit + mUserOp.verificationGasLimit + 5000) {
                assembly {
                    mstore(0, INNER_OUT_OF_GAS)
                    revert(0, 32)
                }
            }
        }
            IPaymaster.PostOpMode mode = IPaymaster.PostOpMode.opSucceeded;
            if (callData.length > 0) {
                bool success = Exec.call(mUserOp.sender, 0, callData, callGasLimit);
                if (!success) {
                    bytes memory result = Exec.getReturnData(REVERT_REASON_MAX_LEN);
                    if (result.length > 0) {
                        emit UserOperationRevertReason(opInfo.userOpHash, mUserOp.sender, mUserOp.nonce, result);
                    }
                    mode = IPaymaster.PostOpMode.opReverted;
                }
            }
        unchecked {
            uint256 actualGas = preGas - gasleft() + opInfo.preOpGas;
            //note: opIndex is ignored (relevant only if mode==postOpReverted, which is only possible outside of innerHandleOp)
            return _handlePostOp(0, mode, opInfo, context, actualGas);
        }
        }
        /**
         * generate a request Id - unique identifier for this request.
         * the request ID is a hash over the content of the userOp (except the signature), the entrypoint and the chainid.
         */
        function getUserOpHash(UserOperation calldata userOp) public view returns (bytes32) {
            return keccak256(abi.encode(userOp.hash(), address(this), block.chainid));
        }
        /**
         * copy general fields from userOp into the memory opInfo structure.
         */
        function _copyUserOpToMemory(UserOperation calldata userOp, MemoryUserOp memory mUserOp) internal pure {
            mUserOp.sender = userOp.sender;
            mUserOp.nonce = userOp.nonce;
            mUserOp.callGasLimit = userOp.callGasLimit;
            mUserOp.verificationGasLimit = userOp.verificationGasLimit;
            mUserOp.preVerificationGas = userOp.preVerificationGas;
            mUserOp.maxFeePerGas = userOp.maxFeePerGas;
            mUserOp.maxPriorityFeePerGas = userOp.maxPriorityFeePerGas;
            bytes calldata paymasterAndData = userOp.paymasterAndData;
            if (paymasterAndData.length > 0) {
                require(paymasterAndData.length >= 20, "AA93 invalid paymasterAndData");
                mUserOp.paymaster = address(bytes20(paymasterAndData[: 20]));
            } else {
                mUserOp.paymaster = address(0);
            }
        }
        /**
         * Simulate a call to account.validateUserOp and paymaster.validatePaymasterUserOp.
         * @dev this method always revert. Successful result is ValidationResult error. other errors are failures.
         * @dev The node must also verify it doesn't use banned opcodes, and that it doesn't reference storage outside the account's data.
         * @param userOp the user operation to validate.
         */
        function simulateValidation(UserOperation calldata userOp) external {
            UserOpInfo memory outOpInfo;
            _simulationOnlyValidations(userOp);
            (uint256 validationData, uint256 paymasterValidationData) = _validatePrepayment(0, userOp, outOpInfo);
            StakeInfo memory paymasterInfo = _getStakeInfo(outOpInfo.mUserOp.paymaster);
            StakeInfo memory senderInfo = _getStakeInfo(outOpInfo.mUserOp.sender);
            StakeInfo memory factoryInfo;
            {
                bytes calldata initCode = userOp.initCode;
                address factory = initCode.length >= 20 ? address(bytes20(initCode[0 : 20])) : address(0);
                factoryInfo = _getStakeInfo(factory);
            }
            ValidationData memory data = _intersectTimeRange(validationData, paymasterValidationData);
            address aggregator = data.aggregator;
            bool sigFailed = aggregator == address(1);
            ReturnInfo memory returnInfo = ReturnInfo(outOpInfo.preOpGas, outOpInfo.prefund,
                sigFailed, data.validAfter, data.validUntil, getMemoryBytesFromOffset(outOpInfo.contextOffset));
            if (aggregator != address(0) && aggregator != address(1)) {
                AggregatorStakeInfo memory aggregatorInfo = AggregatorStakeInfo(aggregator, _getStakeInfo(aggregator));
                revert ValidationResultWithAggregation(returnInfo, senderInfo, factoryInfo, paymasterInfo, aggregatorInfo);
            }
            revert ValidationResult(returnInfo, senderInfo, factoryInfo, paymasterInfo);
        }
        function _getRequiredPrefund(MemoryUserOp memory mUserOp) internal pure returns (uint256 requiredPrefund) {
        unchecked {
            //when using a Paymaster, the verificationGasLimit is used also to as a limit for the postOp call.
            // our security model might call postOp eventually twice
            uint256 mul = mUserOp.paymaster != address(0) ? 3 : 1;
            uint256 requiredGas = mUserOp.callGasLimit + mUserOp.verificationGasLimit * mul + mUserOp.preVerificationGas;
            requiredPrefund = requiredGas * mUserOp.maxFeePerGas;
        }
        }
        // create the sender's contract if needed.
        function _createSenderIfNeeded(uint256 opIndex, UserOpInfo memory opInfo, bytes calldata initCode) internal {
            if (initCode.length != 0) {
                address sender = opInfo.mUserOp.sender;
                if (sender.code.length != 0) revert FailedOp(opIndex, "AA10 sender already constructed");
                address sender1 = senderCreator.createSender{gas : opInfo.mUserOp.verificationGasLimit}(initCode);
                if (sender1 == address(0)) revert FailedOp(opIndex, "AA13 initCode failed or OOG");
                if (sender1 != sender) revert FailedOp(opIndex, "AA14 initCode must return sender");
                if (sender1.code.length == 0) revert FailedOp(opIndex, "AA15 initCode must create sender");
                address factory = address(bytes20(initCode[0 : 20]));
                emit AccountDeployed(opInfo.userOpHash, sender, factory, opInfo.mUserOp.paymaster);
            }
        }
        /**
         * Get counterfactual sender address.
         *  Calculate the sender contract address that will be generated by the initCode and salt in the UserOperation.
         * this method always revert, and returns the address in SenderAddressResult error
         * @param initCode the constructor code to be passed into the UserOperation.
         */
        function getSenderAddress(bytes calldata initCode) public {
            address sender = senderCreator.createSender(initCode);
            revert SenderAddressResult(sender);
        }
        function _simulationOnlyValidations(UserOperation calldata userOp) internal view {
            // solhint-disable-next-line no-empty-blocks
            try this._validateSenderAndPaymaster(userOp.initCode, userOp.sender, userOp.paymasterAndData) {}
            catch Error(string memory revertReason) {
                if (bytes(revertReason).length != 0) {
                    revert FailedOp(0, revertReason);
                }
            }
        }
        /**
        * Called only during simulation.
        * This function always reverts to prevent warm/cold storage differentiation in simulation vs execution.
        */
        function _validateSenderAndPaymaster(bytes calldata initCode, address sender, bytes calldata paymasterAndData) external view {
            if (initCode.length == 0 && sender.code.length == 0) {
                // it would revert anyway. but give a meaningful message
                revert("AA20 account not deployed");
            }
            if (paymasterAndData.length >= 20) {
                address paymaster = address(bytes20(paymasterAndData[0 : 20]));
                if (paymaster.code.length == 0) {
                    // it would revert anyway. but give a meaningful message
                    revert("AA30 paymaster not deployed");
                }
            }
            // always revert
            revert("");
        }
        /**
         * call account.validateUserOp.
         * revert (with FailedOp) in case validateUserOp reverts, or account didn't send required prefund.
         * decrement account's deposit if needed
         */
        function _validateAccountPrepayment(uint256 opIndex, UserOperation calldata op, UserOpInfo memory opInfo, uint256 requiredPrefund)
        internal returns (uint256 gasUsedByValidateAccountPrepayment, uint256 validationData) {
        unchecked {
            uint256 preGas = gasleft();
            MemoryUserOp memory mUserOp = opInfo.mUserOp;
            address sender = mUserOp.sender;
            _createSenderIfNeeded(opIndex, opInfo, op.initCode);
            address paymaster = mUserOp.paymaster;
            numberMarker();
            uint256 missingAccountFunds = 0;
            if (paymaster == address(0)) {
                uint256 bal = balanceOf(sender);
                missingAccountFunds = bal > requiredPrefund ? 0 : requiredPrefund - bal;
            }
            try IAccount(sender).validateUserOp{gas : mUserOp.verificationGasLimit}(op, opInfo.userOpHash, missingAccountFunds)
            returns (uint256 _validationData) {
                validationData = _validationData;
            } catch Error(string memory revertReason) {
                revert FailedOp(opIndex, string.concat("AA23 reverted: ", revertReason));
            } catch {
                revert FailedOp(opIndex, "AA23 reverted (or OOG)");
            }
            if (paymaster == address(0)) {
                DepositInfo storage senderInfo = deposits[sender];
                uint256 deposit = senderInfo.deposit;
                if (requiredPrefund > deposit) {
                    revert FailedOp(opIndex, "AA21 didn't pay prefund");
                }
                senderInfo.deposit = uint112(deposit - requiredPrefund);
            }
            gasUsedByValidateAccountPrepayment = preGas - gasleft();
        }
        }
        /**
         * In case the request has a paymaster:
         * Validate paymaster has enough deposit.
         * Call paymaster.validatePaymasterUserOp.
         * Revert with proper FailedOp in case paymaster reverts.
         * Decrement paymaster's deposit
         */
        function _validatePaymasterPrepayment(uint256 opIndex, UserOperation calldata op, UserOpInfo memory opInfo, uint256 requiredPreFund, uint256 gasUsedByValidateAccountPrepayment)
        internal returns (bytes memory context, uint256 validationData) {
        unchecked {
            MemoryUserOp memory mUserOp = opInfo.mUserOp;
            uint256 verificationGasLimit = mUserOp.verificationGasLimit;
            require(verificationGasLimit > gasUsedByValidateAccountPrepayment, "AA41 too little verificationGas");
            uint256 gas = verificationGasLimit - gasUsedByValidateAccountPrepayment;
            address paymaster = mUserOp.paymaster;
            DepositInfo storage paymasterInfo = deposits[paymaster];
            uint256 deposit = paymasterInfo.deposit;
            if (deposit < requiredPreFund) {
                revert FailedOp(opIndex, "AA31 paymaster deposit too low");
            }
            paymasterInfo.deposit = uint112(deposit - requiredPreFund);
            try IPaymaster(paymaster).validatePaymasterUserOp{gas : gas}(op, opInfo.userOpHash, requiredPreFund) returns (bytes memory _context, uint256 _validationData){
                context = _context;
                validationData = _validationData;
            } catch Error(string memory revertReason) {
                revert FailedOp(opIndex, string.concat("AA33 reverted: ", revertReason));
            } catch {
                revert FailedOp(opIndex, "AA33 reverted (or OOG)");
            }
        }
        }
        /**
         * revert if either account validationData or paymaster validationData is expired
         */
        function _validateAccountAndPaymasterValidationData(uint256 opIndex, uint256 validationData, uint256 paymasterValidationData, address expectedAggregator) internal view {
            (address aggregator, bool outOfTimeRange) = _getValidationData(validationData);
            if (expectedAggregator != aggregator) {
                revert FailedOp(opIndex, "AA24 signature error");
            }
            if (outOfTimeRange) {
                revert FailedOp(opIndex, "AA22 expired or not due");
            }
            //pmAggregator is not a real signature aggregator: we don't have logic to handle it as address.
            // non-zero address means that the paymaster fails due to some signature check (which is ok only during estimation)
            address pmAggregator;
            (pmAggregator, outOfTimeRange) = _getValidationData(paymasterValidationData);
            if (pmAggregator != address(0)) {
                revert FailedOp(opIndex, "AA34 signature error");
            }
            if (outOfTimeRange) {
                revert FailedOp(opIndex, "AA32 paymaster expired or not due");
            }
        }
        function _getValidationData(uint256 validationData) internal view returns (address aggregator, bool outOfTimeRange) {
            if (validationData == 0) {
                return (address(0), false);
            }
            ValidationData memory data = _parseValidationData(validationData);
            // solhint-disable-next-line not-rely-on-time
            outOfTimeRange = block.timestamp > data.validUntil || block.timestamp < data.validAfter;
            aggregator = data.aggregator;
        }
        /**
         * validate account and paymaster (if defined).
         * also make sure total validation doesn't exceed verificationGasLimit
         * this method is called off-chain (simulateValidation()) and on-chain (from handleOps)
         * @param opIndex the index of this userOp into the "opInfos" array
         * @param userOp the userOp to validate
         */
        function _validatePrepayment(uint256 opIndex, UserOperation calldata userOp, UserOpInfo memory outOpInfo)
        private returns (uint256 validationData, uint256 paymasterValidationData) {
            uint256 preGas = gasleft();
            MemoryUserOp memory mUserOp = outOpInfo.mUserOp;
            _copyUserOpToMemory(userOp, mUserOp);
            outOpInfo.userOpHash = getUserOpHash(userOp);
            // validate all numeric values in userOp are well below 128 bit, so they can safely be added
            // and multiplied without causing overflow
            uint256 maxGasValues = mUserOp.preVerificationGas | mUserOp.verificationGasLimit | mUserOp.callGasLimit |
            userOp.maxFeePerGas | userOp.maxPriorityFeePerGas;
            require(maxGasValues <= type(uint120).max, "AA94 gas values overflow");
            uint256 gasUsedByValidateAccountPrepayment;
            (uint256 requiredPreFund) = _getRequiredPrefund(mUserOp);
            (gasUsedByValidateAccountPrepayment, validationData) = _validateAccountPrepayment(opIndex, userOp, outOpInfo, requiredPreFund);
            if (!_validateAndUpdateNonce(mUserOp.sender, mUserOp.nonce)) {
                revert FailedOp(opIndex, "AA25 invalid account nonce");
            }
            //a "marker" where account opcode validation is done and paymaster opcode validation is about to start
            // (used only by off-chain simulateValidation)
            numberMarker();
            bytes memory context;
            if (mUserOp.paymaster != address(0)) {
                (context, paymasterValidationData) = _validatePaymasterPrepayment(opIndex, userOp, outOpInfo, requiredPreFund, gasUsedByValidateAccountPrepayment);
            }
        unchecked {
            uint256 gasUsed = preGas - gasleft();
            if (userOp.verificationGasLimit < gasUsed) {
                revert FailedOp(opIndex, "AA40 over verificationGasLimit");
            }
            outOpInfo.prefund = requiredPreFund;
            outOpInfo.contextOffset = getOffsetOfMemoryBytes(context);
            outOpInfo.preOpGas = preGas - gasleft() + userOp.preVerificationGas;
        }
        }
        /**
         * process post-operation.
         * called just after the callData is executed.
         * if a paymaster is defined and its validation returned a non-empty context, its postOp is called.
         * the excess amount is refunded to the account (or paymaster - if it was used in the request)
         * @param opIndex index in the batch
         * @param mode - whether is called from innerHandleOp, or outside (postOpReverted)
         * @param opInfo userOp fields and info collected during validation
         * @param context the context returned in validatePaymasterUserOp
         * @param actualGas the gas used so far by this user operation
         */
        function _handlePostOp(uint256 opIndex, IPaymaster.PostOpMode mode, UserOpInfo memory opInfo, bytes memory context, uint256 actualGas) private returns (uint256 actualGasCost) {
            uint256 preGas = gasleft();
        unchecked {
            address refundAddress;
            MemoryUserOp memory mUserOp = opInfo.mUserOp;
            uint256 gasPrice = getUserOpGasPrice(mUserOp);
            address paymaster = mUserOp.paymaster;
            if (paymaster == address(0)) {
                refundAddress = mUserOp.sender;
            } else {
                refundAddress = paymaster;
                if (context.length > 0) {
                    actualGasCost = actualGas * gasPrice;
                    if (mode != IPaymaster.PostOpMode.postOpReverted) {
                        IPaymaster(paymaster).postOp{gas : mUserOp.verificationGasLimit}(mode, context, actualGasCost);
                    } else {
                        // solhint-disable-next-line no-empty-blocks
                        try IPaymaster(paymaster).postOp{gas : mUserOp.verificationGasLimit}(mode, context, actualGasCost) {}
                        catch Error(string memory reason) {
                            revert FailedOp(opIndex, string.concat("AA50 postOp reverted: ", reason));
                        }
                        catch {
                            revert FailedOp(opIndex, "AA50 postOp revert");
                        }
                    }
                }
            }
            actualGas += preGas - gasleft();
            actualGasCost = actualGas * gasPrice;
            if (opInfo.prefund < actualGasCost) {
                revert FailedOp(opIndex, "AA51 prefund below actualGasCost");
            }
            uint256 refund = opInfo.prefund - actualGasCost;
            _incrementDeposit(refundAddress, refund);
            bool success = mode == IPaymaster.PostOpMode.opSucceeded;
            emit UserOperationEvent(opInfo.userOpHash, mUserOp.sender, mUserOp.paymaster, mUserOp.nonce, success, actualGasCost, actualGas);
        } // unchecked
        }
        /**
         * the gas price this UserOp agrees to pay.
         * relayer/block builder might submit the TX with higher priorityFee, but the user should not
         */
        function getUserOpGasPrice(MemoryUserOp memory mUserOp) internal view returns (uint256) {
        unchecked {
            uint256 maxFeePerGas = mUserOp.maxFeePerGas;
            uint256 maxPriorityFeePerGas = mUserOp.maxPriorityFeePerGas;
            if (maxFeePerGas == maxPriorityFeePerGas) {
                //legacy mode (for networks that don't support basefee opcode)
                return maxFeePerGas;
            }
            return min(maxFeePerGas, maxPriorityFeePerGas + block.basefee);
        }
        }
        function min(uint256 a, uint256 b) internal pure returns (uint256) {
            return a < b ? a : b;
        }
        function getOffsetOfMemoryBytes(bytes memory data) internal pure returns (uint256 offset) {
            assembly {offset := data}
        }
        function getMemoryBytesFromOffset(uint256 offset) internal pure returns (bytes memory data) {
            assembly {data := offset}
        }
        //place the NUMBER opcode in the code.
        // this is used as a marker during simulation, as this OP is completely banned from the simulated code of the
        // account and paymaster.
        function numberMarker() internal view {
            assembly {mstore(0, number())}
        }
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable no-inline-assembly */
    /**
     * returned data from validateUserOp.
     * validateUserOp returns a uint256, with is created by `_packedValidationData` and parsed by `_parseValidationData`
     * @param aggregator - address(0) - the account validated the signature by itself.
     *              address(1) - the account failed to validate the signature.
     *              otherwise - this is an address of a signature aggregator that must be used to validate the signature.
     * @param validAfter - this UserOp is valid only after this timestamp.
     * @param validaUntil - this UserOp is valid only up to this timestamp.
     */
        struct ValidationData {
            address aggregator;
            uint48 validAfter;
            uint48 validUntil;
        }
    //extract sigFailed, validAfter, validUntil.
    // also convert zero validUntil to type(uint48).max
        function _parseValidationData(uint validationData) pure returns (ValidationData memory data) {
            address aggregator = address(uint160(validationData));
            uint48 validUntil = uint48(validationData >> 160);
            if (validUntil == 0) {
                validUntil = type(uint48).max;
            }
            uint48 validAfter = uint48(validationData >> (48 + 160));
            return ValidationData(aggregator, validAfter, validUntil);
        }
    // intersect account and paymaster ranges.
        function _intersectTimeRange(uint256 validationData, uint256 paymasterValidationData) pure returns (ValidationData memory) {
            ValidationData memory accountValidationData = _parseValidationData(validationData);
            ValidationData memory pmValidationData = _parseValidationData(paymasterValidationData);
            address aggregator = accountValidationData.aggregator;
            if (aggregator == address(0)) {
                aggregator = pmValidationData.aggregator;
            }
            uint48 validAfter = accountValidationData.validAfter;
            uint48 validUntil = accountValidationData.validUntil;
            uint48 pmValidAfter = pmValidationData.validAfter;
            uint48 pmValidUntil = pmValidationData.validUntil;
            if (validAfter < pmValidAfter) validAfter = pmValidAfter;
            if (validUntil > pmValidUntil) validUntil = pmValidUntil;
            return ValidationData(aggregator, validAfter, validUntil);
        }
    /**
     * helper to pack the return value for validateUserOp
     * @param data - the ValidationData to pack
     */
        function _packValidationData(ValidationData memory data) pure returns (uint256) {
            return uint160(data.aggregator) | (uint256(data.validUntil) << 160) | (uint256(data.validAfter) << (160 + 48));
        }
    /**
     * helper to pack the return value for validateUserOp, when not using an aggregator
     * @param sigFailed - true for signature failure, false for success
     * @param validUntil last timestamp this UserOperation is valid (or zero for infinite)
     * @param validAfter first timestamp this UserOperation is valid
     */
        function _packValidationData(bool sigFailed, uint48 validUntil, uint48 validAfter) pure returns (uint256) {
            return (sigFailed ? 1 : 0) | (uint256(validUntil) << 160) | (uint256(validAfter) << (160 + 48));
        }
    /**
     * keccak function over calldata.
     * @dev copy calldata into memory, do keccak and drop allocated memory. Strangely, this is more efficient than letting solidity do it.
     */
        function calldataKeccak(bytes calldata data) pure returns (bytes32 ret) {
            assembly {
                let mem := mload(0x40)
                let len := data.length
                calldatacopy(mem, data.offset, len)
                ret := keccak256(mem, len)
            }
        }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "../interfaces/IEntryPoint.sol";
    /**
     * nonce management functionality
     */
    contract NonceManager is INonceManager {
        /**
         * The next valid sequence number for a given nonce key.
         */
        mapping(address => mapping(uint192 => uint256)) public nonceSequenceNumber;
        function getNonce(address sender, uint192 key)
        public view override returns (uint256 nonce) {
            return nonceSequenceNumber[sender][key] | (uint256(key) << 64);
        }
        // allow an account to manually increment its own nonce.
        // (mainly so that during construction nonce can be made non-zero,
        // to "absorb" the gas cost of first nonce increment to 1st transaction (construction),
        // not to 2nd transaction)
        function incrementNonce(uint192 key) public override {
            nonceSequenceNumber[msg.sender][key]++;
        }
        /**
         * validate nonce uniqueness for this account.
         * called just after validateUserOp()
         */
        function _validateAndUpdateNonce(address sender, uint256 nonce) internal returns (bool) {
            uint192 key = uint192(nonce >> 64);
            uint64 seq = uint64(nonce);
            return nonceSequenceNumber[sender][key]++ == seq;
        }
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /**
     * helper contract for EntryPoint, to call userOp.initCode from a "neutral" address,
     * which is explicitly not the entryPoint itself.
     */
    contract SenderCreator {
        /**
         * call the "initCode" factory to create and return the sender account address
         * @param initCode the initCode value from a UserOp. contains 20 bytes of factory address, followed by calldata
         * @return sender the returned address of the created account, or zero address on failure.
         */
        function createSender(bytes calldata initCode) external returns (address sender) {
            address factory = address(bytes20(initCode[0 : 20]));
            bytes memory initCallData = initCode[20 :];
            bool success;
            /* solhint-disable no-inline-assembly */
            assembly {
                success := call(gas(), factory, 0, add(initCallData, 0x20), mload(initCallData), 0, 32)
                sender := mload(0)
            }
            if (!success) {
                sender = address(0);
            }
        }
    }
    // SPDX-License-Identifier: GPL-3.0-only
    pragma solidity ^0.8.12;
    import "../interfaces/IStakeManager.sol";
    /* solhint-disable avoid-low-level-calls */
    /* solhint-disable not-rely-on-time */
    /**
     * manage deposits and stakes.
     * deposit is just a balance used to pay for UserOperations (either by a paymaster or an account)
     * stake is value locked for at least "unstakeDelay" by a paymaster.
     */
    abstract contract StakeManager is IStakeManager {
        /// maps paymaster to their deposits and stakes
        mapping(address => DepositInfo) public deposits;
        /// @inheritdoc IStakeManager
        function getDepositInfo(address account) public view returns (DepositInfo memory info) {
            return deposits[account];
        }
        // internal method to return just the stake info
        function _getStakeInfo(address addr) internal view returns (StakeInfo memory info) {
            DepositInfo storage depositInfo = deposits[addr];
            info.stake = depositInfo.stake;
            info.unstakeDelaySec = depositInfo.unstakeDelaySec;
        }
        /// return the deposit (for gas payment) of the account
        function balanceOf(address account) public view returns (uint256) {
            return deposits[account].deposit;
        }
        receive() external payable {
            depositTo(msg.sender);
        }
        function _incrementDeposit(address account, uint256 amount) internal {
            DepositInfo storage info = deposits[account];
            uint256 newAmount = info.deposit + amount;
            require(newAmount <= type(uint112).max, "deposit overflow");
            info.deposit = uint112(newAmount);
        }
        /**
         * add to the deposit of the given account
         */
        function depositTo(address account) public payable {
            _incrementDeposit(account, msg.value);
            DepositInfo storage info = deposits[account];
            emit Deposited(account, info.deposit);
        }
        /**
         * add to the account's stake - amount and delay
         * any pending unstake is first cancelled.
         * @param unstakeDelaySec the new lock duration before the deposit can be withdrawn.
         */
        function addStake(uint32 unstakeDelaySec) public payable {
            DepositInfo storage info = deposits[msg.sender];
            require(unstakeDelaySec > 0, "must specify unstake delay");
            require(unstakeDelaySec >= info.unstakeDelaySec, "cannot decrease unstake time");
            uint256 stake = info.stake + msg.value;
            require(stake > 0, "no stake specified");
            require(stake <= type(uint112).max, "stake overflow");
            deposits[msg.sender] = DepositInfo(
                info.deposit,
                true,
                uint112(stake),
                unstakeDelaySec,
                0
            );
            emit StakeLocked(msg.sender, stake, unstakeDelaySec);
        }
        /**
         * attempt to unlock the stake.
         * the value can be withdrawn (using withdrawStake) after the unstake delay.
         */
        function unlockStake() external {
            DepositInfo storage info = deposits[msg.sender];
            require(info.unstakeDelaySec != 0, "not staked");
            require(info.staked, "already unstaking");
            uint48 withdrawTime = uint48(block.timestamp) + info.unstakeDelaySec;
            info.withdrawTime = withdrawTime;
            info.staked = false;
            emit StakeUnlocked(msg.sender, withdrawTime);
        }
        /**
         * withdraw from the (unlocked) stake.
         * must first call unlockStake and wait for the unstakeDelay to pass
         * @param withdrawAddress the address to send withdrawn value.
         */
        function withdrawStake(address payable withdrawAddress) external {
            DepositInfo storage info = deposits[msg.sender];
            uint256 stake = info.stake;
            require(stake > 0, "No stake to withdraw");
            require(info.withdrawTime > 0, "must call unlockStake() first");
            require(info.withdrawTime <= block.timestamp, "Stake withdrawal is not due");
            info.unstakeDelaySec = 0;
            info.withdrawTime = 0;
            info.stake = 0;
            emit StakeWithdrawn(msg.sender, withdrawAddress, stake);
            (bool success,) = withdrawAddress.call{value : stake}("");
            require(success, "failed to withdraw stake");
        }
        /**
         * withdraw from the deposit.
         * @param withdrawAddress the address to send withdrawn value.
         * @param withdrawAmount the amount to withdraw.
         */
        function withdrawTo(address payable withdrawAddress, uint256 withdrawAmount) external {
            DepositInfo storage info = deposits[msg.sender];
            require(withdrawAmount <= info.deposit, "Withdraw amount too large");
            info.deposit = uint112(info.deposit - withdrawAmount);
            emit Withdrawn(msg.sender, withdrawAddress, withdrawAmount);
            (bool success,) = withdrawAddress.call{value : withdrawAmount}("");
            require(success, "failed to withdraw");
        }
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "./UserOperation.sol";
    interface IAccount {
        /**
         * Validate user's signature and nonce
         * the entryPoint will make the call to the recipient only if this validation call returns successfully.
         * signature failure should be reported by returning SIG_VALIDATION_FAILED (1).
         * This allows making a "simulation call" without a valid signature
         * Other failures (e.g. nonce mismatch, or invalid signature format) should still revert to signal failure.
         *
         * @dev Must validate caller is the entryPoint.
         *      Must validate the signature and nonce
         * @param userOp the operation that is about to be executed.
         * @param userOpHash hash of the user's request data. can be used as the basis for signature.
         * @param missingAccountFunds missing funds on the account's deposit in the entrypoint.
         *      This is the minimum amount to transfer to the sender(entryPoint) to be able to make the call.
         *      The excess is left as a deposit in the entrypoint, for future calls.
         *      can be withdrawn anytime using "entryPoint.withdrawTo()"
         *      In case there is a paymaster in the request (or the current deposit is high enough), this value will be zero.
         * @return validationData packaged ValidationData structure. use `_packValidationData` and `_unpackValidationData` to encode and decode
         *      <20-byte> sigAuthorizer - 0 for valid signature, 1 to mark signature failure,
         *         otherwise, an address of an "authorizer" contract.
         *      <6-byte> validUntil - last timestamp this operation is valid. 0 for "indefinite"
         *      <6-byte> validAfter - first timestamp this operation is valid
         *      If an account doesn't use time-range, it is enough to return SIG_VALIDATION_FAILED value (1) for signature failure.
         *      Note that the validation code cannot use block.timestamp (or block.number) directly.
         */
        function validateUserOp(UserOperation calldata userOp, bytes32 userOpHash, uint256 missingAccountFunds)
        external returns (uint256 validationData);
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "./UserOperation.sol";
    /**
     * Aggregated Signatures validator.
     */
    interface IAggregator {
        /**
         * validate aggregated signature.
         * revert if the aggregated signature does not match the given list of operations.
         */
        function validateSignatures(UserOperation[] calldata userOps, bytes calldata signature) external view;
        /**
         * validate signature of a single userOp
         * This method is should be called by bundler after EntryPoint.simulateValidation() returns (reverts) with ValidationResultWithAggregation
         * First it validates the signature over the userOp. Then it returns data to be used when creating the handleOps.
         * @param userOp the userOperation received from the user.
         * @return sigForUserOp the value to put into the signature field of the userOp when calling handleOps.
         *    (usually empty, unless account and aggregator support some kind of "multisig"
         */
        function validateUserOpSignature(UserOperation calldata userOp)
        external view returns (bytes memory sigForUserOp);
        /**
         * aggregate multiple signatures into a single value.
         * This method is called off-chain to calculate the signature to pass with handleOps()
         * bundler MAY use optimized custom code perform this aggregation
         * @param userOps array of UserOperations to collect the signatures from.
         * @return aggregatedSignature the aggregated signature
         */
        function aggregateSignatures(UserOperation[] calldata userOps) external view returns (bytes memory aggregatedSignature);
    }
    /**
     ** Account-Abstraction (EIP-4337) singleton EntryPoint implementation.
     ** Only one instance required on each chain.
     **/
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable avoid-low-level-calls */
    /* solhint-disable no-inline-assembly */
    /* solhint-disable reason-string */
    import "./UserOperation.sol";
    import "./IStakeManager.sol";
    import "./IAggregator.sol";
    import "./INonceManager.sol";
    interface IEntryPoint is IStakeManager, INonceManager {
        /***
         * An event emitted after each successful request
         * @param userOpHash - unique identifier for the request (hash its entire content, except signature).
         * @param sender - the account that generates this request.
         * @param paymaster - if non-null, the paymaster that pays for this request.
         * @param nonce - the nonce value from the request.
         * @param success - true if the sender transaction succeeded, false if reverted.
         * @param actualGasCost - actual amount paid (by account or paymaster) for this UserOperation.
         * @param actualGasUsed - total gas used by this UserOperation (including preVerification, creation, validation and execution).
         */
        event UserOperationEvent(bytes32 indexed userOpHash, address indexed sender, address indexed paymaster, uint256 nonce, bool success, uint256 actualGasCost, uint256 actualGasUsed);
        /**
         * account "sender" was deployed.
         * @param userOpHash the userOp that deployed this account. UserOperationEvent will follow.
         * @param sender the account that is deployed
         * @param factory the factory used to deploy this account (in the initCode)
         * @param paymaster the paymaster used by this UserOp
         */
        event AccountDeployed(bytes32 indexed userOpHash, address indexed sender, address factory, address paymaster);
        /**
         * An event emitted if the UserOperation "callData" reverted with non-zero length
         * @param userOpHash the request unique identifier.
         * @param sender the sender of this request
         * @param nonce the nonce used in the request
         * @param revertReason - the return bytes from the (reverted) call to "callData".
         */
        event UserOperationRevertReason(bytes32 indexed userOpHash, address indexed sender, uint256 nonce, bytes revertReason);
        /**
         * an event emitted by handleOps(), before starting the execution loop.
         * any event emitted before this event, is part of the validation.
         */
        event BeforeExecution();
        /**
         * signature aggregator used by the following UserOperationEvents within this bundle.
         */
        event SignatureAggregatorChanged(address indexed aggregator);
        /**
         * a custom revert error of handleOps, to identify the offending op.
         *  NOTE: if simulateValidation passes successfully, there should be no reason for handleOps to fail on it.
         *  @param opIndex - index into the array of ops to the failed one (in simulateValidation, this is always zero)
         *  @param reason - revert reason
         *      The string starts with a unique code "AAmn", where "m" is "1" for factory, "2" for account and "3" for paymaster issues,
         *      so a failure can be attributed to the correct entity.
         *   Should be caught in off-chain handleOps simulation and not happen on-chain.
         *   Useful for mitigating DoS attempts against batchers or for troubleshooting of factory/account/paymaster reverts.
         */
        error FailedOp(uint256 opIndex, string reason);
        /**
         * error case when a signature aggregator fails to verify the aggregated signature it had created.
         */
        error SignatureValidationFailed(address aggregator);
        /**
         * Successful result from simulateValidation.
         * @param returnInfo gas and time-range returned values
         * @param senderInfo stake information about the sender
         * @param factoryInfo stake information about the factory (if any)
         * @param paymasterInfo stake information about the paymaster (if any)
         */
        error ValidationResult(ReturnInfo returnInfo,
            StakeInfo senderInfo, StakeInfo factoryInfo, StakeInfo paymasterInfo);
        /**
         * Successful result from simulateValidation, if the account returns a signature aggregator
         * @param returnInfo gas and time-range returned values
         * @param senderInfo stake information about the sender
         * @param factoryInfo stake information about the factory (if any)
         * @param paymasterInfo stake information about the paymaster (if any)
         * @param aggregatorInfo signature aggregation info (if the account requires signature aggregator)
         *      bundler MUST use it to verify the signature, or reject the UserOperation
         */
        error ValidationResultWithAggregation(ReturnInfo returnInfo,
            StakeInfo senderInfo, StakeInfo factoryInfo, StakeInfo paymasterInfo,
            AggregatorStakeInfo aggregatorInfo);
        /**
         * return value of getSenderAddress
         */
        error SenderAddressResult(address sender);
        /**
         * return value of simulateHandleOp
         */
        error ExecutionResult(uint256 preOpGas, uint256 paid, uint48 validAfter, uint48 validUntil, bool targetSuccess, bytes targetResult);
        //UserOps handled, per aggregator
        struct UserOpsPerAggregator {
            UserOperation[] userOps;
            // aggregator address
            IAggregator aggregator;
            // aggregated signature
            bytes signature;
        }
        /**
         * Execute a batch of UserOperation.
         * no signature aggregator is used.
         * if any account requires an aggregator (that is, it returned an aggregator when
         * performing simulateValidation), then handleAggregatedOps() must be used instead.
         * @param ops the operations to execute
         * @param beneficiary the address to receive the fees
         */
        function handleOps(UserOperation[] calldata ops, address payable beneficiary) external;
        /**
         * Execute a batch of UserOperation with Aggregators
         * @param opsPerAggregator the operations to execute, grouped by aggregator (or address(0) for no-aggregator accounts)
         * @param beneficiary the address to receive the fees
         */
        function handleAggregatedOps(
            UserOpsPerAggregator[] calldata opsPerAggregator,
            address payable beneficiary
        ) external;
        /**
         * generate a request Id - unique identifier for this request.
         * the request ID is a hash over the content of the userOp (except the signature), the entrypoint and the chainid.
         */
        function getUserOpHash(UserOperation calldata userOp) external view returns (bytes32);
        /**
         * Simulate a call to account.validateUserOp and paymaster.validatePaymasterUserOp.
         * @dev this method always revert. Successful result is ValidationResult error. other errors are failures.
         * @dev The node must also verify it doesn't use banned opcodes, and that it doesn't reference storage outside the account's data.
         * @param userOp the user operation to validate.
         */
        function simulateValidation(UserOperation calldata userOp) external;
        /**
         * gas and return values during simulation
         * @param preOpGas the gas used for validation (including preValidationGas)
         * @param prefund the required prefund for this operation
         * @param sigFailed validateUserOp's (or paymaster's) signature check failed
         * @param validAfter - first timestamp this UserOp is valid (merging account and paymaster time-range)
         * @param validUntil - last timestamp this UserOp is valid (merging account and paymaster time-range)
         * @param paymasterContext returned by validatePaymasterUserOp (to be passed into postOp)
         */
        struct ReturnInfo {
            uint256 preOpGas;
            uint256 prefund;
            bool sigFailed;
            uint48 validAfter;
            uint48 validUntil;
            bytes paymasterContext;
        }
        /**
         * returned aggregated signature info.
         * the aggregator returned by the account, and its current stake.
         */
        struct AggregatorStakeInfo {
            address aggregator;
            StakeInfo stakeInfo;
        }
        /**
         * Get counterfactual sender address.
         *  Calculate the sender contract address that will be generated by the initCode and salt in the UserOperation.
         * this method always revert, and returns the address in SenderAddressResult error
         * @param initCode the constructor code to be passed into the UserOperation.
         */
        function getSenderAddress(bytes memory initCode) external;
        /**
         * simulate full execution of a UserOperation (including both validation and target execution)
         * this method will always revert with "ExecutionResult".
         * it performs full validation of the UserOperation, but ignores signature error.
         * an optional target address is called after the userop succeeds, and its value is returned
         * (before the entire call is reverted)
         * Note that in order to collect the the success/failure of the target call, it must be executed
         * with trace enabled to track the emitted events.
         * @param op the UserOperation to simulate
         * @param target if nonzero, a target address to call after userop simulation. If called, the targetSuccess and targetResult
         *        are set to the return from that call.
         * @param targetCallData callData to pass to target address
         */
        function simulateHandleOp(UserOperation calldata op, address target, bytes calldata targetCallData) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    interface INonceManager {
        /**
         * Return the next nonce for this sender.
         * Within a given key, the nonce values are sequenced (starting with zero, and incremented by one on each userop)
         * But UserOp with different keys can come with arbitrary order.
         *
         * @param sender the account address
         * @param key the high 192 bit of the nonce
         * @return nonce a full nonce to pass for next UserOp with this sender.
         */
        function getNonce(address sender, uint192 key)
        external view returns (uint256 nonce);
        /**
         * Manually increment the nonce of the sender.
         * This method is exposed just for completeness..
         * Account does NOT need to call it, neither during validation, nor elsewhere,
         * as the EntryPoint will update the nonce regardless.
         * Possible use-case is call it with various keys to "initialize" their nonces to one, so that future
         * UserOperations will not pay extra for the first transaction with a given key.
         */
        function incrementNonce(uint192 key) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    import "./UserOperation.sol";
    /**
     * the interface exposed by a paymaster contract, who agrees to pay the gas for user's operations.
     * a paymaster must hold a stake to cover the required entrypoint stake and also the gas for the transaction.
     */
    interface IPaymaster {
        enum PostOpMode {
            opSucceeded, // user op succeeded
            opReverted, // user op reverted. still has to pay for gas.
            postOpReverted //user op succeeded, but caused postOp to revert. Now it's a 2nd call, after user's op was deliberately reverted.
        }
        /**
         * payment validation: check if paymaster agrees to pay.
         * Must verify sender is the entryPoint.
         * Revert to reject this request.
         * Note that bundlers will reject this method if it changes the state, unless the paymaster is trusted (whitelisted)
         * The paymaster pre-pays using its deposit, and receive back a refund after the postOp method returns.
         * @param userOp the user operation
         * @param userOpHash hash of the user's request data.
         * @param maxCost the maximum cost of this transaction (based on maximum gas and gas price from userOp)
         * @return context value to send to a postOp
         *      zero length to signify postOp is not required.
         * @return validationData signature and time-range of this operation, encoded the same as the return value of validateUserOperation
         *      <20-byte> sigAuthorizer - 0 for valid signature, 1 to mark signature failure,
         *         otherwise, an address of an "authorizer" contract.
         *      <6-byte> validUntil - last timestamp this operation is valid. 0 for "indefinite"
         *      <6-byte> validAfter - first timestamp this operation is valid
         *      Note that the validation code cannot use block.timestamp (or block.number) directly.
         */
        function validatePaymasterUserOp(UserOperation calldata userOp, bytes32 userOpHash, uint256 maxCost)
        external returns (bytes memory context, uint256 validationData);
        /**
         * post-operation handler.
         * Must verify sender is the entryPoint
         * @param mode enum with the following options:
         *      opSucceeded - user operation succeeded.
         *      opReverted  - user op reverted. still has to pay for gas.
         *      postOpReverted - user op succeeded, but caused postOp (in mode=opSucceeded) to revert.
         *                       Now this is the 2nd call, after user's op was deliberately reverted.
         * @param context - the context value returned by validatePaymasterUserOp
         * @param actualGasCost - actual gas used so far (without this postOp call).
         */
        function postOp(PostOpMode mode, bytes calldata context, uint256 actualGasCost) external;
    }
    // SPDX-License-Identifier: GPL-3.0-only
    pragma solidity ^0.8.12;
    /**
     * manage deposits and stakes.
     * deposit is just a balance used to pay for UserOperations (either by a paymaster or an account)
     * stake is value locked for at least "unstakeDelay" by the staked entity.
     */
    interface IStakeManager {
        event Deposited(
            address indexed account,
            uint256 totalDeposit
        );
        event Withdrawn(
            address indexed account,
            address withdrawAddress,
            uint256 amount
        );
        /// Emitted when stake or unstake delay are modified
        event StakeLocked(
            address indexed account,
            uint256 totalStaked,
            uint256 unstakeDelaySec
        );
        /// Emitted once a stake is scheduled for withdrawal
        event StakeUnlocked(
            address indexed account,
            uint256 withdrawTime
        );
        event StakeWithdrawn(
            address indexed account,
            address withdrawAddress,
            uint256 amount
        );
        /**
         * @param deposit the entity's deposit
         * @param staked true if this entity is staked.
         * @param stake actual amount of ether staked for this entity.
         * @param unstakeDelaySec minimum delay to withdraw the stake.
         * @param withdrawTime - first block timestamp where 'withdrawStake' will be callable, or zero if already locked
         * @dev sizes were chosen so that (deposit,staked, stake) fit into one cell (used during handleOps)
         *    and the rest fit into a 2nd cell.
         *    112 bit allows for 10^15 eth
         *    48 bit for full timestamp
         *    32 bit allows 150 years for unstake delay
         */
        struct DepositInfo {
            uint112 deposit;
            bool staked;
            uint112 stake;
            uint32 unstakeDelaySec;
            uint48 withdrawTime;
        }
        //API struct used by getStakeInfo and simulateValidation
        struct StakeInfo {
            uint256 stake;
            uint256 unstakeDelaySec;
        }
        /// @return info - full deposit information of given account
        function getDepositInfo(address account) external view returns (DepositInfo memory info);
        /// @return the deposit (for gas payment) of the account
        function balanceOf(address account) external view returns (uint256);
        /**
         * add to the deposit of the given account
         */
        function depositTo(address account) external payable;
        /**
         * add to the account's stake - amount and delay
         * any pending unstake is first cancelled.
         * @param _unstakeDelaySec the new lock duration before the deposit can be withdrawn.
         */
        function addStake(uint32 _unstakeDelaySec) external payable;
        /**
         * attempt to unlock the stake.
         * the value can be withdrawn (using withdrawStake) after the unstake delay.
         */
        function unlockStake() external;
        /**
         * withdraw from the (unlocked) stake.
         * must first call unlockStake and wait for the unstakeDelay to pass
         * @param withdrawAddress the address to send withdrawn value.
         */
        function withdrawStake(address payable withdrawAddress) external;
        /**
         * withdraw from the deposit.
         * @param withdrawAddress the address to send withdrawn value.
         * @param withdrawAmount the amount to withdraw.
         */
        function withdrawTo(address payable withdrawAddress, uint256 withdrawAmount) external;
    }
    // SPDX-License-Identifier: GPL-3.0
    pragma solidity ^0.8.12;
    /* solhint-disable no-inline-assembly */
    import {calldataKeccak} from "../core/Helpers.sol";
    /**
     * User Operation struct
     * @param sender the sender account of this request.
         * @param nonce unique value the sender uses to verify it is not a replay.
         * @param initCode if set, the account contract will be created by this constructor/
         * @param callData the method call to execute on this account.
         * @param callGasLimit the gas limit passed to the callData method call.
         * @param verificationGasLimit gas used for validateUserOp and validatePaymasterUserOp.
         * @param preVerificationGas gas not calculated by the handleOps method, but added to the gas paid. Covers batch overhead.
         * @param maxFeePerGas same as EIP-1559 gas parameter.
         * @param maxPriorityFeePerGas same as EIP-1559 gas parameter.
         * @param paymasterAndData if set, this field holds the paymaster address and paymaster-specific data. the paymaster will pay for the transaction instead of the sender.
         * @param signature sender-verified signature over the entire request, the EntryPoint address and the chain ID.
         */
        struct UserOperation {
            address sender;
            uint256 nonce;
            bytes initCode;
            bytes callData;
            uint256 callGasLimit;
            uint256 verificationGasLimit;
            uint256 preVerificationGas;
            uint256 maxFeePerGas;
            uint256 maxPriorityFeePerGas;
            bytes paymasterAndData;
            bytes signature;
        }
    /**
     * Utility functions helpful when working with UserOperation structs.
     */
    library UserOperationLib {
        function getSender(UserOperation calldata userOp) internal pure returns (address) {
            address data;
            //read sender from userOp, which is first userOp member (saves 800 gas...)
            assembly {data := calldataload(userOp)}
            return address(uint160(data));
        }
        //relayer/block builder might submit the TX with higher priorityFee, but the user should not
        // pay above what he signed for.
        function gasPrice(UserOperation calldata userOp) internal view returns (uint256) {
        unchecked {
            uint256 maxFeePerGas = userOp.maxFeePerGas;
            uint256 maxPriorityFeePerGas = userOp.maxPriorityFeePerGas;
            if (maxFeePerGas == maxPriorityFeePerGas) {
                //legacy mode (for networks that don't support basefee opcode)
                return maxFeePerGas;
            }
            return min(maxFeePerGas, maxPriorityFeePerGas + block.basefee);
        }
        }
        function pack(UserOperation calldata userOp) internal pure returns (bytes memory ret) {
            address sender = getSender(userOp);
            uint256 nonce = userOp.nonce;
            bytes32 hashInitCode = calldataKeccak(userOp.initCode);
            bytes32 hashCallData = calldataKeccak(userOp.callData);
            uint256 callGasLimit = userOp.callGasLimit;
            uint256 verificationGasLimit = userOp.verificationGasLimit;
            uint256 preVerificationGas = userOp.preVerificationGas;
            uint256 maxFeePerGas = userOp.maxFeePerGas;
            uint256 maxPriorityFeePerGas = userOp.maxPriorityFeePerGas;
            bytes32 hashPaymasterAndData = calldataKeccak(userOp.paymasterAndData);
            return abi.encode(
                sender, nonce,
                hashInitCode, hashCallData,
                callGasLimit, verificationGasLimit, preVerificationGas,
                maxFeePerGas, maxPriorityFeePerGas,
                hashPaymasterAndData
            );
        }
        function hash(UserOperation calldata userOp) internal pure returns (bytes32) {
            return keccak256(pack(userOp));
        }
        function min(uint256 a, uint256 b) internal pure returns (uint256) {
            return a < b ? a : b;
        }
    }
    // SPDX-License-Identifier: LGPL-3.0-only
    pragma solidity >=0.7.5 <0.9.0;
    // solhint-disable no-inline-assembly
    /**
     * Utility functions helpful when making different kinds of contract calls in Solidity.
     */
    library Exec {
        function call(
            address to,
            uint256 value,
            bytes memory data,
            uint256 txGas
        ) internal returns (bool success) {
            assembly {
                success := call(txGas, to, value, add(data, 0x20), mload(data), 0, 0)
            }
        }
        function staticcall(
            address to,
            bytes memory data,
            uint256 txGas
        ) internal view returns (bool success) {
            assembly {
                success := staticcall(txGas, to, add(data, 0x20), mload(data), 0, 0)
            }
        }
        function delegateCall(
            address to,
            bytes memory data,
            uint256 txGas
        ) internal returns (bool success) {
            assembly {
                success := delegatecall(txGas, to, add(data, 0x20), mload(data), 0, 0)
            }
        }
        // get returned data from last call or calldelegate
        function getReturnData(uint256 maxLen) internal pure returns (bytes memory returnData) {
            assembly {
                let len := returndatasize()
                if gt(len, maxLen) {
                    len := maxLen
                }
                let ptr := mload(0x40)
                mstore(0x40, add(ptr, add(len, 0x20)))
                mstore(ptr, len)
                returndatacopy(add(ptr, 0x20), 0, len)
                returnData := ptr
            }
        }
        // revert with explicit byte array (probably reverted info from call)
        function revertWithData(bytes memory returnData) internal pure {
            assembly {
                revert(add(returnData, 32), mload(returnData))
            }
        }
        function callAndRevert(address to, bytes memory data, uint256 maxLen) internal {
            bool success = call(to,0,data,gasleft());
            if (!success) {
                revertWithData(getReturnData(maxLen));
            }
        }
    }